Sciweavers

5934 search results - page 1115 / 1187
» Detecting a Network Failure
Sort
View
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
16 years 6 months ago
Stream Monitoring under the Time Warping Distance
The goal of this paper is to monitor numerical streams, and to find subsequences that are similar to a given query sequence, under the DTW (Dynamic Time Warping) distance. Applica...
Yasushi Sakurai, Christos Faloutsos, Masashi Yamam...
274
Voted
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
16 years 6 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
MICCAI
2009
Springer
16 years 6 months ago
Using Real-Time fMRI to Control a Dynamical System by Brain Activity Classification
We present a method for controlling a dynamical system using real-time fMRI. The objective for the subject in the MR scanner is to balance an inverted pendulum by activating the le...
Anders Eklund, Henrik Ohlsson, Mats T. Andersson...
WWW
2006
ACM
16 years 6 months ago
Logical structure based semantic relationship extraction from semi-structured documents
Addressed in this paper is the issue of semantic relationship extraction from semi-structured documents. Many research efforts have been made so far on the semantic information ex...
Kuo Zhang, Gang Wu, Juan-Zi Li
148
Voted
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 5 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
« Prev « First page 1115 / 1187 Last » Next »