Sciweavers

543 search results - page 71 / 109
» Detecting anomalies in data streams using statecharts
Sort
View
KDD
2010
ACM
161views Data Mining» more  KDD 2010»
14 years 11 months ago
Mass estimation and its applications
This paper introduces mass estimation—a base modelling mechanism in data mining. It provides the theoretical basis of mass and an efficient method to estimate mass. We show that...
Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, Jame...
ICDCS
2008
IEEE
15 years 4 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 10 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
15 years 9 months ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...
ICMCS
2005
IEEE
77views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Rewritable Data Embedding on MPEG Coded Data Domain
In this paper, we propose a rewritable data embedding scheme on MPEG coded data domain for content managements including DRM, content controlling and indexing. Data embedding is p...
Katsuhiro Nakajima, Kiyoshi Tanaka, Tetsuya Matsuo...