Skip to main content
    • by 
    • by 
    •   2  
      Anomaly DetectionSequences
    • by 
    • by 
    •   2  
      Anomaly DetectionSequences
Abstract Distributed Shared Memory (DSM)[1] has become a very popular paradigm in distributed systems. A DSM is essentially a way of seamlessly sharing the physical memories of loosely connected systems. An implementation of a DSM can be... more
    • by 
Outlier detection is an important problem that has been researched within diverse knowledge disciplines and application domains. Many of these techniques have been specifically developed for certain application domains, while others are... more
    • by 
Outlier detection has been a very important concept in the realm of data analysis. Recently, several application domains have realized the direct mapping between outliers in data and real world anomalies, that are of great interest to an... more
    • by 
Abstract Measuring similarity or distance between two entities is a key step for several data mining and knowledge discovery tasks. The notion of similarity for continuous data is relatively well-understood, but for categorical data, the... more
    • by 
ABSTRACT This thesis deals with the problem of anomaly detection for sequence data. Anomaly detection has been a widely researched problem in several application domains such as system health management, intrusion detection, health-care,... more
    • by 
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application-the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to... more
    • by 
Abstract This survey attempts to provide a comprehensive and structured overview of the existing research for the problem of detecting anomalies in discrete/symbolic sequences. The objective is to provide a global understanding of the... more
    • by 
Abstract: The goal of the effort was to develop a comprehensive situational awareness analysis tool for discovery of intrusive behavior in information infrastructures and understanding anomalous network traffic. The University of... more
    • by 
Abstract In this paper, we formulate the problem of summarization of a data set of transactions with categorical attributes as an optimization problem involving two objective functions–compaction gain and information loss. We propose... more
    • by 
Abstract Characterizing vegetation phenology is a highly significant problem, due to its importance in regulating ecosystem carbon cycling, interacting with climate changes, and decision-making of croplands managements. While ground based... more
    • by 
Abstract Reference based analysis (RBA) is a novel data mining tool for exploring a test data set with respect to a reference data set. The power of RBA lies in it ability to transform any complex data type, such as symbolic sequences and... more
    • by 
ABSTRACT Gaussian process (GP) is increasingly becoming popular as a kernel machine learning tool for non-parametric data analysis. Recently, GP has been applied to model non-linear dependencies in time series data. GP based analysis can... more
    • by 
One of the practical issues in clustering is the specification of the appropriate number of clusters, which is not obvious when analyzing geospatial datasets, partly because they are huge (both in size and spatial extent) and high... more
    • by 
Abstract Measuring similarity or distance between two entities is a key step for several data mining and knowledge discovery tasks. The notion of similarity for continuous data is relatively well-understood, but for categorical data, the... more
    • by 
Abstract Accurate damage assessment due to major natural and anthropogenic disasters is becoming critical due to increasing human and economic losses. This increase in loss of life and severe damages can be attributed to the growing... more
    • by 
Abstract Online time series change detection is a critical component of many monitoring systems, such as space and air-borne remote sensing instruments, cardiac monitors, and network traffic profilers, which continuously analyze... more
    • by