Sciweavers

772 search results - page 92 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
ICWSM
2009
15 years 28 days ago
Event Detection and Tracking in Social Streams
Events and stories can be characterized by a set of descriptive, collocated keywords. Intuitively, documents describing the same event will contain similar sets of keywords, and t...
Hassan Sayyadi, Matthew Hurst, Alexey Maykov
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 3 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
WEBI
2009
Springer
15 years 9 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ECCV
2010
Springer
15 years 8 months ago
Detecting People Using Mutually Consistent Poselet Activations
Bourdev and Malik (ICCV 09) introduced a new notion of parts, poselets, constructed to be tightly clustered both in the configuration space of keypoints, as well as in the appeara...
BMCBI
2004
208views more  BMCBI 2004»
15 years 3 months ago
Hybrid clustering for microarray image analysis combining intensity and shape features
Background: Image analysis is the first crucial step to obtain reliable results from microarray experiments. First, areas in the image belonging to single spots have to be identif...
Jörg Rahnenführer, Daniel Bozinov