Sciweavers

726 search results - page 109 / 146
» From Anomaly Reports to Cases
Sort
View
MDM
2009
Springer
299views Communications» more  MDM 2009»
15 years 6 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
SDM
2011
SIAM
230views Data Mining» more  SDM 2011»
14 years 2 months ago
Multidimensional Association Rules in Boolean Tensors
Popular data mining methods support knowledge discovery from patterns that hold in binary relations. We study the generalization of association rule mining within arbitrary n-ary ...
Kim-Ngan Nguyen, Loïc Cerf, Marc Plantevit, J...
PAM
2012
Springer
13 years 7 months ago
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
Maria Konte, Nick Feamster
93
Voted
ICALT
2007
IEEE
15 years 6 months ago
A Collaborative Support Tool for Creativity Learning: Idea Storming Cube
Creativity plays an important role in many learning activities but how to enhance creativity with the support of modern computer tools deserves further studies. In this paper, we ...
Chun-Chieh Huang, Tsai-Yen Li, Hao-Chuan Wang, Chu...
ICFEM
2004
Springer
15 years 5 months ago
Learning to Verify Safety Properties
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniqu...
Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gu...