-
1
-
-
33748692296
-
Discovering system health anomalies using data mining techniques
-
presented at the, Moffett Field, CA
-
A. N. Srivastava, "Discovering system health anomalies using data mining techniques," presented at the 2005 Joint Army Navy NASA Airforce Conf. Propulsion. Moffett Field, CA.
-
2005 Joint Army Navy NASA Airforce Conf. Propulsion
-
-
Srivastava, A.N.1
-
4
-
-
33751070352
-
Integrated system health management (ISHM): Systematic capability implementation
-
F. Figueroa, R. Holland, J. Schmalzel, and D. Duncavage, "Integrated system health management (ISHM): Systematic capability implementation," in Proc. 2006 IEEE Sens. Appl. Symp., pp. 202-206.
-
Proc. 2006 IEEE Sens. Appl. Symp
, pp. 202-206
-
-
Figueroa, F.1
Holland, R.2
Schmalzel, J.3
Duncavage, D.4
-
5
-
-
84947766271
-
Clustering techniques in biological sequence analysis
-
A. M. Manning, A. Brass, C.A. Goble, and J. A. Keane, "Clustering techniques in biological sequence analysis," in Proc. 1st Eur. Symp. Principles Data Mining Knowl. Discovery, 1997, pp. 315-322.
-
(1997)
Proc. 1st Eur. Symp. Principles Data Mining Knowl. Discovery
, pp. 315-322
-
-
Manning, A.M.1
Brass, A.2
Goble, C.A.3
Keane, J.A.4
-
6
-
-
85008036580
-
Sequential data mining: A comparative case study in development of atherosclerosis risk factors
-
Jan
-
J. Klema, L. Novakova, F. Karel, O. Stepankova, and F. Zelezny, "Sequential data mining: A comparative case study in development of atherosclerosis risk factors," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 1, pp. 3-15, Jan. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev
, vol.38
, Issue.1
, pp. 3-15
-
-
Klema, J.1
Novakova, L.2
Karel, F.3
Stepankova, O.4
Zelezny, F.5
-
8
-
-
6344252275
-
Clustering navigation patterns on a website using a sequence alignment method
-
Seattle, WA
-
B. Hay, K. Vanhoof, and G. Wetsr, "Clustering navigation patterns on a website using a sequence alignment method," in Proc. 17th Int. Joint Conf. Artif. Intell., Seattle, WA, 2001, pp. 1-6.
-
(2001)
Proc. 17th Int. Joint Conf. Artif. Intell
, pp. 1-6
-
-
Hay, B.1
Vanhoof, K.2
Wetsr, G.3
-
9
-
-
0037330341
-
A review of symbolic analysis of experimental data
-
C. Daw, C. Finney, and E. Tracy, "A review of symbolic analysis of experimental data," Rev. Sci. Instrum., vol. 74, no. 2, pp. 915-930, 2003.
-
(2003)
Rev. Sci. Instrum
, vol.74
, Issue.2
, pp. 915-930
-
-
Daw, C.1
Finney, C.2
Tracy, E.3
-
10
-
-
2542613410
-
Scalable clustering methods for data mining
-
Mahwah, NJ: Lawrence Erlbaum
-
J. Ghosh, "Scalable clustering methods for data mining," in Handbook of Data Mining. Mahwah, NJ: Lawrence Erlbaum, 2003, pp. 247-277.
-
(2003)
Handbook of Data Mining
, pp. 247-277
-
-
Ghosh, J.1
-
11
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
12
-
-
0022099671
-
Some properties of continuous hidden Markov model representations
-
Jul./Aug
-
L. R. Rabiner, B. H. Juang, S. E. Levinson, and M. M. Sondhi, "Some properties of continuous hidden Markov model representations," AT&T Tech. J., vol. 64, no. 6, pp. 257-286, Jul./Aug. 1985.
-
(1985)
AT&T Tech. J
, vol.64
, Issue.6
, pp. 257-286
-
-
Rabiner, L.R.1
Juang, B.H.2
Levinson, S.E.3
Sondhi, M.M.4
-
13
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," in Proc. IEEE Symp. Security Privacy, 1999, pp. 133-145.
-
(1999)
Proc. IEEE Symp. Security Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
15
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
V. Levenshtein, "Binary codes capable of correcting deletions, insertions and reversals," Sov. Phys. - Dokl., vol. 10, no. 8, pp. 707-710, 1966.
-
(1966)
Sov. Phys. - Dokl
, vol.10
, Issue.8
, pp. 707-710
-
-
Levenshtein, V.1
-
16
-
-
0004116989
-
-
2nd ed. Cambridge, MA: MIT Press
-
T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. Cambridge, MA: MIT Press, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
17
-
-
0035748125
-
A graph-based clustering method for a large set of sequences using a graph partitioning algorithm
-
H. Kawaji, Y. Yamaguchi, H. Matsuda, and A. Hashimoto, "A graph-based clustering method for a large set of sequences using a graph partitioning algorithm," Genome Inf., vol. 12, pp. 93-102, 2001.
-
(2001)
Genome Inf
, vol.12
, pp. 93-102
-
-
Kawaji, H.1
Yamaguchi, Y.2
Matsuda, H.3
Hashimoto, A.4
-
18
-
-
33751181595
-
-
V. Guralnik andG.Karypis, A scalable algorithm for clustering sequential data, in Proc. 1st IEEE Conf. Data Mining, 2001, pp. 179-186.
-
V. Guralnik andG.Karypis, "A scalable algorithm for clustering sequential data," in Proc. 1st IEEE Conf. Data Mining, 2001, pp. 179-186.
-
-
-
-
19
-
-
15944400613
-
Recursive data mining for masquerade detection and author identification
-
B. Szymanski and Y. Zhang, "Recursive data mining for masquerade detection and author identification," in Proc. 5th Annu. IEEE Int. Conf. Syst., Man, Cybern.. Inf. Assurance Workshop, 2004, pp. 424-431.
-
(2004)
Proc. 5th Annu. IEEE Int. Conf. Syst., Man, Cybern.. Inf. Assurance Workshop
, pp. 424-431
-
-
Szymanski, B.1
Zhang, Y.2
-
20
-
-
58649116329
-
Fuzzy ROC curves for the 1 class SVM: Application to intrusion detection
-
P. F. Evangelista, P. Bonnisone, M. J. Embrechts, and B. K. Szymanski, "Fuzzy ROC curves for the 1 class SVM: Application to intrusion detection," in Proc. 13th Eur. Symp. Artif. Neural Netw., 2005, pp. 345-350.
-
(2005)
Proc. 13th Eur. Symp. Artif. Neural Netw
, pp. 345-350
-
-
Evangelista, P.F.1
Bonnisone, P.2
Embrechts, M.J.3
Szymanski, B.K.4
-
22
-
-
0036709106
-
Clarans: A method for clustering objects for spatial data mining
-
Sep./Oct
-
R. Ng and J.Han, "Clarans: A method for clustering objects for spatial data mining," IEEE Trans. Knowl. Data Eng., vol. 14, no. 5, pp. 1003-1016, Sep./Oct. 2002.
-
(2002)
IEEE Trans. Knowl. Data Eng
, vol.14
, Issue.5
, pp. 1003-1016
-
-
Ng, R.1
Han, J.2
-
23
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases
-
M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, "A density-based algorithm for discovering clusters in large spatial databases," in Proc. 2nd Int. Conf. Knowl. Discovery Data Mining, 1996, pp. 226-231.
-
(1996)
Proc. 2nd Int. Conf. Knowl. Discovery Data Mining
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
24
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
M. Breunig, H.-P. Kriegel, R. Ng, and J. Sander, "LOF: Identifying density-based local outliers," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2000, pp. 93-104.
-
(2000)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 93-104
-
-
Breunig, M.1
Kriegel, H.-P.2
Ng, R.3
Sander, J.4
-
25
-
-
0004137004
-
-
Cambridge, U.K, Cambridge Univ. Press
-
D. Gusfield, Algorithms on Strings, Trees, and Sequences. Cambridge, U.K.: Cambridge Univ. Press, 1997.
-
(1997)
Algorithms on Strings, Trees, and Sequences
-
-
Gusfield, D.1
-
26
-
-
18544370703
-
Hardness results for the center and median string problems under the weighted and unweighted edit distances
-
Jun
-
F. Nicolas and E. Rivals, "Hardness results for the center and median string problems under the weighted and unweighted edit distances," J. Discr. Alg., vol. 3, no. 2-4, pp. 390-415, Jun. 2005.
-
(2005)
J. Discr. Alg
, vol.3
, Issue.2-4
, pp. 390-415
-
-
Nicolas, F.1
Rivals, E.2
-
27
-
-
0001922584
-
Topology of strings: Median string is NP-complete
-
C. de la Higuera and F. Casacuberta, "Topology of strings: Median string is NP-complete," Theor. Comput. Sci., vol. 230, no. 1/2, pp. 39-48, 2000.
-
(2000)
Theor. Comput. Sci
, vol.230
, Issue.1-2
, pp. 39-48
-
-
de la Higuera, C.1
Casacuberta, F.2
-
28
-
-
0017492836
-
A fast algorithm for computing longest common subsequences
-
May
-
J.W. Hunt and T. G. Szymanski, "A fast algorithm for computing longest common subsequences," Commun. ACM, vol. 20, no. 5, pp. 350-353, May 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.5
, pp. 350-353
-
-
Hunt, J.W.1
Szymanski, T.G.2
-
29
-
-
84976825385
-
Algorithms for the longest common subsequence problem
-
Oct
-
D. S. Hirschberg, "Algorithms for the longest common subsequence problem," J. ACM, vol. 24, no. 4, pp. 664-675, Oct. 1977.
-
(1977)
J. ACM
, vol.24
, Issue.4
, pp. 664-675
-
-
Hirschberg, D.S.1
-
30
-
-
0016518550
-
A linear space algorithm for computing maximal common subsequences
-
Jun
-
D. S. Hirschberg, "A linear space algorithm for computing maximal common subsequences," Commun. ACM, vol. 18, no. 6, pp. 341-343, Jun. 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.6
, pp. 341-343
-
-
Hirschberg, D.S.1
-
31
-
-
84964528874
-
A survey of longest common subsequence algorithms
-
L. Bergroth, H. Hakonen, and T. Raita, "A survey of longest common subsequence algorithms," in Proc. 7th Int. Symp. String Process. Inf. Retrieval (SPIRE), 2000, pp. 39-48.
-
(2000)
Proc. 7th Int. Symp. String Process. Inf. Retrieval (SPIRE)
, pp. 39-48
-
-
Bergroth, L.1
Hakonen, H.2
Raita, T.3
|