Sciweavers

2775 search results - page 460 / 555
» Differencing Data Streams
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 10 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 10 months ago
On Finding Frequent Patterns in Event Sequences
Given a directed acyclic graph with labeled vertices, we consider the problem of finding the most common label sequences ("traces") among all paths in the graph (of some...
Andrea Campagna, Rasmus Pagh
IJSNET
2008
113views more  IJSNET 2008»
14 years 9 months ago
Reservation-based protocol for monitoring applications using IEEE 802.15.4 sensor networks
: The IEEE 802.15.4 and Zigbee are protocols aimed at low-duty and low-power wireless sensor networks. Continuously monitoring applications such as applications of structural healt...
Vidya Krishnamurthy, Edward Sazonov
OSN
2008
83views more  OSN 2008»
14 years 9 months ago
Path selection in user-controlled circuit-switched optical networks
User-controlled circuit-switched optical networks are gaining popularity in an effort to fulfill the insatiable data transport needs of the online community. In this paper we cons...
Wojciech M. Golab, Raouf Boutaba
SIGIR
2008
ACM
14 years 9 months ago
Advances in information and knowledge management
Several research areas today overlap between the tracks of databases, information retrieval and knowledge management, such as natural language processing, semantic web, digital li...
Aparna S. Varde, Jian Pei