-
1
-
-
85012236181
-
A framework for clustering evolving data streams
-
In, Berlin, Germany: VLDB Endowment
-
Aggarwal, C. C., Han, J., Wang, J., & Yu, P. S. (2003). A framework for clustering evolving data streams. In Proceedings of the 29th Conference on Very Large Data Bases. Berlin, Germany: VLDB Endowment.
-
(2003)
Proceedings of the 29th Conference on Very Large Data Bases
-
-
Aggarwal, C.C.1
Han, J.2
Wang, J.3
Yu, P.S.4
-
3
-
-
0036013593
-
Statistical mechanics of complex networks
-
doi:10.1103/RevModPhys.74.47
-
Albert, R., & Barabási, A.-L. (2002). Statistical mechanics of complex networks. Reviews of Modern Physics, 74, 47-97. doi:10.1103/RevModPhys.74.47
-
(2002)
Reviews of Modern Physics
, vol.74
, pp. 47-97
-
-
Albert, R.1
Barabási, A.-L.2
-
4
-
-
0033539175
-
Diameter of the world-wide web
-
doi:10.1038/43601
-
Albert, R., Jeong, H., & Barabási, A.-L. (1999). Diameter of the world-wide web. Nature, 401, 130. doi:10.1038/43601
-
(1999)
Nature
, vol.401
, pp. 130
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
5
-
-
0034721164
-
Error and attack tolerance of complex networks
-
doi:10.1038/35019019
-
Albert, R., Jeong, H., & Barabási, A.-L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378-382. doi:10.1038/35019019
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
6
-
-
0012844008
-
Geographic information technologies and their potentially erosive effects on personal privacy
-
doi:10.1016/S0165-4896(01)000853
-
Armstrong, M. P. (2002). Geographic information technologies and their potentially erosive effects on personal privacy. Studies in the Social Sciences, 27, 19-28. doi:10.1016/S0165-4896(01)000853
-
(2002)
Studies in the Social Sciences
, vol.27
, pp. 19-28
-
-
Armstrong, M.P.1
-
7
-
-
32544444999
-
Geographic information technologies and personal privacy
-
Armstrong, M. P., & Ruggles, A. J. (2005). Geographic information technologies and personal privacy. Cartographica, 40, 4.
-
(2005)
Cartographica
, vol.40
, pp. 4
-
-
Armstrong, M.P.1
Ruggles, A.J.2
-
8
-
-
35248815017
-
-
Associated Press, Retrieved from
-
Associated Press. (2005). Tracking cell phones for real-time traffic data. Retrieved from http://www.wired.com/news/wireless/0,1382,69227,00.html
-
(2005)
Tracking Cell Phones for Real-time Traffic Data
-
-
-
10
-
-
0038483826
-
Emergence of scaling in random networks
-
doi:10.1126/science.286.5439.509
-
Barabási, A.-L., & Albert, R. (1999). Emergence of scaling in random networks. Science, 286, 509-512. doi:10.1126/science.286.5439.509
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
12
-
-
0042527883
-
On the properties of small-world networks
-
doi:10.1007/s100510050067
-
Barrat, A., & Weigt, W. (2000). On the Properties of Small-World Networks. The European Physical Journal B, 13, 547-560. doi:10.1007/s100510050067
-
(2000)
The European Physical Journal B
, vol.13
, pp. 547-560
-
-
Barrat, A.1
Weigt, W.2
-
14
-
-
0142142693
-
-
In J. M. Juran, F. M. Gryna, Jr., & R. Bingham, Jr. (Eds.), (pp. 23-1-23-35). New York: McGraw Hill
-
Bicking, C., & Gryna, F. M., Jr. (1979). Quality control handbook. In J. M. Juran, F. M. Gryna, Jr., & R. Bingham, Jr. (Eds.), (pp. 23-1-23-35). New York: McGraw Hill.
-
(1979)
Quality Control Handbook
-
-
Bicking, C.1
Gryna Jr., F.M.2
-
15
-
-
31344474880
-
Complex networks: Structure and dynamics
-
doi:10.1016/j.physrep.2005.10.009
-
Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., & Hwang, D.-U. (2006). Complex networks: Structure and dynamics. Physics Reports, 424, 175-308. doi:10.1016/j.physrep.2005.10.009
-
(2006)
Physics Reports
, vol.424
, pp. 175-308
-
-
Boccaletti, S.1
Latora, V.2
Moreno, Y.3
Chavez, M.4
Hwang, D.-U.5
-
16
-
-
0038589165
-
The anatomy of a large-scale hypertextual web search engine
-
Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1-7), 107-117.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
17
-
-
44449169915
-
Uncovering individual and collective human dynamics from mobile phone records
-
June, (224015), doi:10.1088/1751-8113/41/22/224015
-
Candia, J., González, M. C., Wang, P., Schoenharl, T., Madey, G., & Barabási, A.-L. (2008, June). Uncovering individual and collective human dynamics from mobile phone records. Journal of Physics A. Mathematical and Theoretical, 41, 224015. doi:10.1088/1751-8113/41/22/224015
-
(2008)
Journal of Physics A. Mathematical and Theoretical
, vol.41
-
-
Candia, J.1
González, M.C.2
Wang, P.3
Schoenharl, T.4
Madey, G.5
Barabási, A.-L.6
-
19
-
-
0030675156
-
Incremental clustering and dynamic information retrieval
-
In
-
Charikar, M., Chekuri, C., Feder, T., & Motwani, R. (1997) Incremental clustering and dynamic information retrieval. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing.
-
(1997)
Proceedings of the 29th Annual ACM Symposium on Theory of Computing
-
-
Charikar, M.1
Chekuri, C.2
Feder, T.3
Motwani, R.4
-
21
-
-
33645579248
-
Hybrid hierarchical clustering with applications to microarray data
-
doi:10.1093/biostatistics/kxj007
-
Chipman, H., & Tibshirani, R. (2006). Hybrid hierarchical clustering with applications to microarray data. Biostatistics (Oxford, England), 7(2), 286-301. doi:10.1093/biostatistics/kxj007
-
(2006)
Biostatistics (Oxford, England)
, vol.7
, Issue.2
, pp. 286-301
-
-
Chipman, H.1
Tibshirani, R.2
-
23
-
-
33845641379
-
Structure discovery in sequentially-connected data streams
-
doi:10.1142/S0218213006003041
-
Coble, J., Cook, D. J., & Holder, L. B. (2006). Structure discovery in sequentially-connected data streams. International Journal of Artificial Intelligence Tools, 15(6), 917-944. doi:10.1142/S0218213006003041
-
(2006)
International Journal of Artificial Intelligence Tools
, vol.15
, Issue.6
, pp. 917-944
-
-
Coble, J.1
Cook, D.J.2
Holder, L.B.3
-
24
-
-
0027652468
-
Substructure discovery using minimum description length and background knowledge
-
Cook, D. J., & Holder, L. B. (1994). Substructure discovery using minimum description length and background knowledge. Journal of Artificial Intelligence Research, 1, 231-255.
-
(1994)
Journal of Artificial Intelligence Research
, vol.1
, pp. 231-255
-
-
Cook, D.J.1
Holder, L.B.2
-
25
-
-
0742306282
-
Computational methods for dynamic graphs
-
doi:10.1198/1061860032742
-
Cortes, C., Pregibon, D., & Volinsky, C. (2003). Computational methods for dynamic graphs. Journal of Computational and Graphical Statistics, 12, 950-970. doi:10.1198/1061860032742
-
(2003)
Journal of Computational and Graphical Statistics
, vol.12
, pp. 950-970
-
-
Cortes, C.1
Pregibon, D.2
Volinsky, C.3
-
27
-
-
84899326577
-
Directive 95/64/EC of the European parliament and of the council of 24 october 1995
-
European Parliament and Council of the European Union
-
European Parliament and Council of the European Union. (1995). Directive 95/64/EC of the European Parliament and of the Council of 24 October 1995. Official Journal of the European Communities, 281, 30-51.
-
(1995)
Official Journal of the European Communities
, vol.281
, pp. 30-51
-
-
-
28
-
-
84899306292
-
European data protection law
-
doi:10.2307/839754
-
Evans, A. C. (1981). European data protection law. The American Journal of Comparative Law, 29, 571-582. doi:10.2307/839754
-
(1981)
The American Journal of Comparative Law
, vol.29
, pp. 571-582
-
-
Evans, A.C.1
-
29
-
-
0343442766
-
Knowledge acquisition via incremental conceptual clustering
-
Fisher, D. H. (1987). Knowledge acquisition via incremental conceptual clustering. Machine Learning, 2, 139-172.
-
(1987)
Machine Learning
, vol.2
, pp. 139-172
-
-
Fisher, D.H.1
-
30
-
-
84899277665
-
k-anonymous decision tree induction
-
In J. Fürnkranz, T. Scheffer, & M. Spiliopoulou (Eds.)
-
Friedman, A., Schuster, A., & Wolff, R. (2006). k-Anonymous decision tree induction. In J. Fürnkranz, T. Scheffer, & M. Spiliopoulou (Eds.), Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases.
-
(2006)
Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases
-
-
Friedman, A.1
Schuster, A.2
Wolff, R.3
-
31
-
-
33746689579
-
Link mining: A survey
-
doi:10.1145/1117454.1117456
-
Getoor, L., & Diehl, C. P. (2005). Link mining: A survey. SIGKDD Explorations Newsletter, 7(2), 3-12. doi:10.1145/1117454.1117456
-
(2005)
SIGKDD Explorations Newsletter
, vol.7
, Issue.2
, pp. 3-12
-
-
Getoor, L.1
Diehl, C.P.2
-
32
-
-
34047105077
-
Complex networks: From data to models
-
doi:10.1038/nphys581
-
González, M. C., & Barabási, A.-L. (2007). Complex networks: From data to models. Nature Physics, 3, 224-225. doi:10.1038/nphys581
-
(2007)
Nature Physics
, vol.3
, pp. 224-225
-
-
González, M.C.1
Barabási, A.-L.2
-
33
-
-
44849122540
-
Understanding individual mobility patterns
-
doi:10.1038/nature06958
-
González, M. C., Hidalgo, C. A., & Barabási, A.-L. (2008). Understanding individual mobility patterns. Nature, 453, 479-482. doi:10.1038/nature06958
-
(2008)
Nature
, vol.453
, pp. 479-482
-
-
González, M.C.1
Hidalgo, C.A.2
Barabási, A.-L.3
-
34
-
-
0038633423
-
Clustering data streams: Theory and practice
-
May/June, doi:10.1109/TKDE.2003.1198387
-
Guha, S., Meyerson, A., Mishra, N., Motwani, R., & O'Callaghan, L. (2003, May/June). Clustering data streams: Theory and practice. IEEE Transactions on Knowledge and Data Engineering, 3, 515-528. doi:10.1109/TKDE.2003.1198387
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.3
, pp. 515-528
-
-
Guha, S.1
Meyerson, A.2
Mishra, N.3
Motwani, R.4
O'Callaghan, L.5
-
38
-
-
37049023828
-
Learning to detect events with markov-modulated poisson processes
-
Ihler, A., Hutchins, J., & Smyth, P. (2007). Learning to detect events with markov-modulated poisson processes. ACM Transactions on Knowledge Discovery from Data, 1(3).
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.3
-
-
Ihler, A.1
Hutchins, J.2
Smyth, P.3
-
39
-
-
84893405732
-
Data clustering: A review
-
September, doi:10.1145/331499.331504
-
Jain, A. K., Murty, M. N., & Flynn, P. J. (1999, September). Data clustering: A review. ACM Computing Surveys, 31(3), 264-323. doi:10.1145/331499.331504
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
40
-
-
12244296735
-
When do data mining results violate privacy?
-
In, New York: ACM Press
-
Kantarcioglu, M., Jin, J., & Clifton, C. (2004). When do data mining results violate privacy? In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 599-604). New York: ACM Press.
-
(2004)
Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
41
-
-
33746437508
-
Privacy preserving data mining
-
doi:10.1007/s00145-001-0019-2
-
Lindell, Y., & Pinkas, B. (2002). Privacy preserving data mining. Journal of Cryptology, 15(3), 177-206. doi:10.1007/s00145-001-0019-2
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
42
-
-
37249082666
-
Enhanced situational awareness: Application of DDDAS concepts to emergency and disaster management
-
In Y. Shi, G. D. van Albada, J. Dongarra, & P. M. A. Sloot (Eds.), Berlin, Germany: Springer
-
Madey, G. R., Barabási, A.-L., Chawla, N. V., Gonzalez, M., Hachen, D., Lantz, B., et al. (2007). Enhanced situational awareness: Application of DDDAS concepts to emergency and disaster management. In Y. Shi, G. D. van Albada, J. Dongarra, & P. M. A. Sloot (Eds.), Proceedings of the International Conference on Computational Science (Vol. 4487, pp. 1090-1097). Berlin, Germany: Springer.
-
(2007)
Proceedings of the International Conference on Computational Science
, vol.4487
, pp. 1090-1097
-
-
Madey, G.R.1
Barabási, A.-L.2
Chawla, N.V.3
Gonzalez, M.4
Hachen, D.5
Lantz, B.6
-
43
-
-
33746590710
-
WIPER: The integrated wireless phone based emergency response system
-
In V. N. Alexandrov, G. D. val Albada, P. M. A. Sloot, & J. Dongarra (Eds.), Berlin, Germany: Springer-Verlag
-
Madey, G. R., Szabó, G., & Barabási, A.-L. (2006). WIPER: The integrated wireless phone based emergency response system. In V. N. Alexandrov, G. D. val Albada, P. M. A. Sloot, & J. Dongarra (Eds.), Proceedings of the International Conference on Computational Science (Vol. 3993, pp. 417-424). Berlin, Germany: Springer-Verlag.
-
(2006)
Proceedings of the International Conference on Computational Science
, vol.3993
, pp. 417-424
-
-
Madey, G.R.1
Szabó, G.2
Barabási, A.-L.3
-
44
-
-
0036522403
-
Unsupervised feature selection using feature similarity
-
doi:10.1109/34.990133
-
Mitra, P., Murthy, C., & Pal, S. K. (2002). Unsupervised feature selection using feature similarity. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(3), 301-312. doi:10.1109/34.990133
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 301-312
-
-
Mitra, P.1
Murthy, C.2
Pal, S.K.3
-
46
-
-
0042923706
-
Towards a theory of privacy in the information age
-
doi:10.1145/270858.270866
-
Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27(3), 27-32. doi:10.1145/270858.270866
-
(1997)
ACM SIGCAS Computers and Society
, vol.27
, Issue.3
, pp. 27-32
-
-
Moor, J.H.1
-
47
-
-
84899228581
-
U.S.-EU "Safe Harbor" data privacy arrangement
-
(Ed.)
-
Murray, S. D. (Ed.). (2001). U.S.-EU "Safe Harbor" Data Privacy Arrangement. The American Journal of International Law, 91, 169-169.
-
(2001)
The American Journal of International Law
, vol.91
, pp. 169
-
-
Murray, S.D.1
-
50
-
-
0038718854
-
The structure and function of complex networks
-
doi:10.1137/S003614450342480
-
Newman, M. (2003). The structure and function of complex networks. SIAM Review, 45(2), 167-256. doi:10.1137/S003614450342480
-
(2003)
SIAM Review
, vol.45
, Issue.2
, pp. 167-256
-
-
Newman, M.1
-
51
-
-
84884073625
-
-
(Eds.), Princeton, NJ: Princeton University Press
-
Newman, M., Barabási, A.-L., & Watts, D. J. (Eds.). (2006). The structure and dynamics of networks. Princeton, NJ: Princeton University Press.
-
(2006)
The Structure and Dynamics of Networks
-
-
Newman, M.1
Barabási, A.-L.2
Watts, D.J.3
-
53
-
-
18744389789
-
Assortative mixing in networks
-
(208701)
-
Newman, M. E. J. (2002). Assortative mixing in networks. Physical Review Letters, 89(208701).
-
(2002)
Physical Review Letters
, vol.89
-
-
Newman, M.E.J.1
-
54
-
-
2942564706
-
Detecting community structure in networks
-
doi:10.1140/epjb/e200400124-y
-
Newman, M. E. J. (2004). Detecting community structure in networks. The European Physical Journal B, 38, 321-330. doi:10.1140/epjb/e200400124-y
-
(2004)
The European Physical Journal B
, vol.38
, pp. 321-330
-
-
Newman, M.E.J.1
-
56
-
-
34547457209
-
Analysis of a large-scale weighted network of one-to-one human communication
-
doi:10.1088/1367-2630/9/6/179
-
Onnela, J.-P., Saramäki, J., Hyvönen, J., Szabó, G., de Menezes, M. A., & Kaski, K. (2007a). Analysis of a large-scale weighted network of one-to-one human communication. New Journal of Physics, 9, 179. doi:10.1088/1367-2630/9/6/179
-
(2007)
New Journal of Physics
, vol.9
, pp. 179
-
-
Onnela, J.-P.1
Saramäki, J.2
Hyvönen, J.3
Szabó, G.4
de Menezes, M.A.5
Kaski, K.6
-
57
-
-
34250628484
-
Structure and tie strengths in mobile communication networks
-
doi:10.1073/pnas.0610245104
-
Onnela, J.-P., Saramäki, J., Hyvövnen, J., Szabó, G., Lazer, D., & Kaski, K. (2007b). Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences of the United States of America, 104(18), 7332-7336. doi:10.1073/pnas.0610245104
-
(2007)
Proceedings of the National Academy of Sciences of the United States of America
, vol.104
, Issue.18
, pp. 7332-7336
-
-
Onnela, J.-P.1
Saramäki, J.2
Hyvövnen, J.3
Szabó, G.4
Lazer, D.5
Kaski, K.6
-
58
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
In, LNCS 1592
-
Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology -Eeurocrypt '99 Proceedings (LNCS 1592, pp. 223-238).
-
(1999)
Advances in Cryptology -Eeurocrypt '99 Proceedings
, pp. 223-238
-
-
Paillier, P.1
-
59
-
-
35248857398
-
Anomaly detection in a mobile communication network
-
doi:10.1007/s10588-007-9018-7
-
Pawling, A., Chawla, N. V., & Madey, G. (2007). Anomaly detection in a mobile communication network. Computational & Mathematical Organization Theory, 13(4), 407-422. doi:10.1007/s10588-007-9018-7
-
(2007)
Computational & Mathematical Organization Theory
, vol.13
, Issue.4
, pp. 407-422
-
-
Pawling, A.1
Chawla, N.V.2
Madey, G.3
-
60
-
-
84905583224
-
WIPER: An emergency response system
-
In
-
Pawling, A., Schoenharl, T., Yan, P., & Madey, G. (2008). WIPER: An emergency response system. In Proceedings of the 5th International Information Systems for Crisis Response and Management Conference.
-
(2008)
Proceedings of the 5th International Information Systems for Crisis Response and Management Conference
-
-
Pawling, A.1
Schoenharl, T.2
Yan, P.3
Madey, G.4
-
61
-
-
35248821954
-
WIPER: Leveraging the cell phone network for emergency response
-
Schoenharl, T., Bravo, R., & Madey, G. (2006). WIPER: Leveraging the cell phone network for emergency response. International Journal of Intelligent Control and Systems, 11(4), 209-216.
-
(2006)
International Journal of Intelligent Control and Systems
, vol.11
, Issue.4
, pp. 209-216
-
-
Schoenharl, T.1
Bravo, R.2
Madey, G.3
-
62
-
-
47749088680
-
Evaluation of measurement techniques for the validation of agent-based simulations agains streaming data
-
In M. Bubak, G.D. van Albada, J. Dongarra, & P.M.A. Sloot (Eds.), Heidelberg, Germany: Springer
-
Schoenharl, T., & Madey, G. (2008). Evaluation of measurement techniques for the validation of agent-based simulations agains streaming data. In M. Bubak, G.D. van Albada, J. Dongarra, & P.M.A. Sloot (Eds.), Proceedings of the International Conference on Computational Science (Vol. 5103, pp. 6-15). Heidelberg, Germany: Springer.
-
(2008)
Proceedings of the International Conference on Computational Science
, vol.5103
, pp. 6-15
-
-
Schoenharl, T.1
Madey, G.2
-
63
-
-
84905509106
-
WIPER: A multi-agent system for emergency response
-
In B. van de Walle & M. Turoff (Eds.)
-
Schoenharl, T., Madey, G., Szabó, G., & Barabási, A.-L. (2006). WIPER: A multi-agent system for emergency response. In B. van de Walle & M. Turoff (Eds.), Proceedings of the 3rd International Information Systems for Crisis Response and Management Conference.
-
(2006)
Proceedings of the 3rd International Information Systems for Crisis Response and Management Conference
-
-
Schoenharl, T.1
Madey, G.2
Szabó, G.3
Barabási, A.-L.4
-
64
-
-
0036045758
-
Conceptualizing privacy
-
doi:10.2307/3481326
-
Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90, 1088-1155. doi:10.2307/3481326
-
(2002)
California Law Review
, vol.90
, pp. 1088-1155
-
-
Solove, D.J.1
-
65
-
-
57349110717
-
"I've got nothing to hide" and other misunderstandings of privacy
-
Solove, D. J. (2007). "I've got nothing to hide" and other misunderstandings of privacy. The San Diego Law Review, 44.
-
(2007)
The San Diego Law Review
, vol.44
-
-
Solove, D.J.1
-
69
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
doi:10.1111/j.1748-720X.1997.tb01885.x
-
Sweeney, L. (1997). Weaving technology and policy together to maintain confidentiality. The Journal of Law, Medicine & Ethics, 25, 98-110. doi:10.1111/j.1748-720X.1997.tb01885.x
-
(1997)
The Journal of Law, Medicine & Ethics
, vol.25
, pp. 98-110
-
-
Sweeney, L.1
-
72
-
-
0004081447
-
-
Princeton, NJ: Princeton University Press
-
Watts, D. J. (1999). Small worlds. Princeton, NJ: Princeton University Press.
-
(1999)
Small Worlds
-
-
Watts, D.J.1
-
73
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
doi:10.1038/30918
-
Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of 'small-world' networks. Nature, 393, 440-442. doi:10.1038/30918
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
74
-
-
84899359558
-
-
Working Paper
-
Yan, P., Schoenharl, T., Pawling, A., & Madey, G. (2007). Anomaly detection in the WIPER system using a Markov modulated Poisson process. Working Paper. http://www.nd.edu/~dddas/Papers/MMPP.pdf
-
(2007)
Anomaly Detection in the WIPER System Using a Markov Modulated Poisson Process
-
-
Yan, P.1
Schoenharl, T.2
Pawling, A.3
Madey, G.4
|