Sciweavers

479 search results - page 63 / 96
» Intrusion Detection Based on Data Mining
Sort
View
MASS
2010
157views Communications» more  MASS 2010»
14 years 9 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
ICCV
2007
IEEE
16 years 1 months ago
Efficient Mining of Frequent and Distinctive Feature Configurations
We present a novel approach to automatically find spatial configurations of local features occurring frequently on instances of a given object class, and rarely on the background....
Till Quack, Vittorio Ferrari, Bastian Leibe, Luc J...
UM
2010
Springer
15 years 4 months ago
Detecting Gaming the System in Constraint-Based Tutors
Recently, detectors of gaming the system have been developed for several intelligent tutoring systems where the problem-solving process is reified, and gaming consists of systemati...
Ryan S. J. d. Baker, Antonija Mitrovic, Moffat Mat...
DMIN
2009
119views Data Mining» more  DMIN 2009»
14 years 9 months ago
Abnormal Process State Detection by Cluster Center Point Monitoring in BWR Nuclear Power Plant
This paper proposes a new method to detect abnormal process state. The method is based on cluster center point monitoring in time and is demonstrated in its application to data fro...
Jaakko Talonen, Miki Sirola
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
15 years 6 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong