Search
Now showing items 41-50 of 106
Approaches For Validating Frequent Episodes Based On Periodicity In Time-series Data
(Computer Science & Engineering, 2007-08-23)
There is ongoing research on sequence mining of time-series data. We study Hybrid Apriori, an interval-based approach to episode discovery that deals with different periodicities in time-series data. Our study identifies ...
Runtime Optimization And Load Shedding In MavStream: Design And Implementation
(Computer Science & Engineering, 2007-08-23)
In data stream processing systems Quality of Service (or QoS) is extremely important. The system should try its best to meet the QoS requirements specified by a user. On account of this difference, unlike in a database ...
Efficient Main Memory Algorithms For Significant Interval And Frequent Episode Discovery
(Computer Science & Engineering, 2007-08-23)
There is a considerable research on sequential mining of time-series data. Sensor-based applications such as MavHome require prediction of events for automating the environment using time-series data collected over a period ...
SQL-based Approach To Significant Interval Discovery In Time-Series Data
(Computer Science & Engineering, 2007-08-23)
With time-series data, events (like turning off a light, opening garage door, turning on TV) occur with a high degree of certainty not at specific time points but within time intervals (sequence of time points). So, it is ...
Power And Distortion Optimized Video Coding For Pervasive Computing Applications
(Computer Science & Engineering, 2007-08-23)
This dissertation investigates video encoding schemes for pervasive computing applications that must ensure low power consumption in addition to high compression efficiency. The contribution of the dissertation is the ...
Generalization And Enforcement Of Role-based Access Control Using A Novel Event-based Approach
(Computer Science & Engineering, 2007-08-23)
Protecting information against unauthorized access is a key issue in information system security. Advanced access control models and mechanisms have now become necessary for applications and systems due to emerging acts, ...
WiLDCAT: An Integrated Stealth Environment For Dynamic Malware Analysis
(Computer Science & Engineering, 2007-08-23)
Malware -- a term that refers to viruses, trojans, worms, spyware or any form of malicious code -- is widespread today. Given the devastating effects that malware have on the computing world, detecting and countering malware ...
An Application Of Parallel And Distributed Computing Methods To Approximate Pattern Matching Of Genetic Regulatory Motifs
(Computer Science & Engineering, 2007-08-23)
Bioinformatics is a relatively new scientific field concerned with providing computational means and support to research in molecular biology and genetics. It draws from many different areas of computer science, including ...
Dynamic Push And Pull Strategy Based On Data Interpolation For Web Sensor Networks
(Computer Science & Engineering, 2007-09-17)
Sensor Web, a new trend has been developed recently to effectively network large scale deployed heterogeneous sensors with Internet to make sensor data discoverable, accessible and controllable via World Wide Web. Since ...
Investigation Of Techniques To Increase The Scalability Of Graph-based Data Mining Algorithms.
(Computer Science & Engineering, 2007-08-23)
Frequent subgraph pattern recognition and graph-based relational learning have been an emerging area of data mining research with scientific and commercial applications. At the kernel of these algorithms are the ...