PERFORMANCE EVALUATION OF REAL-TIME EVENT DETECTION ALGORITHMS
暂无分享,去创建一个
[1] Tom Fawcett,et al. Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.
[2] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[3] S. Pehkonen,et al. Oxidation of diazinon by aqueous chlorine: kinetics, mechanisms, and product studies. , 1999, Journal of agricultural and food chemistry.
[4] David E. Culler,et al. Design of a wireless sensor network platform for detecting rare, random, and ephemeral events , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[5] Mauricio G. C. Resende,et al. A Hybrid Heuristic for the p-Median Problem , 2004, J. Heuristics.
[6] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[7] W.G. Zanardelli,et al. Failure Prognosis for Permanent Magnet AC Drives Based on Wavelet Analysis , 2005, IEEE International Conference on Electric Machines and Drives, 2005..
[8] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.
[9] Michael Berg,et al. Kinetics and mechanistic aspects of As(III) oxidation by aqueous chlorine, chloramines, and ozone: relevance to drinking water treatment. , 2006, Environmental science & technology.
[10] Avi Ostfeld,et al. A Stochastic Early Warning Detection System Model for Drinking Water Distribution Systems Security , 2004 .
[11] Jonathan W. Berry,et al. Scalable High-Performance Heuristics for Sensor Placement in Water Distribution Networks , 2005 .
[12] James G. Uber,et al. Greedy Heuristic Methods for Locating Water Quality Sensors in Distribution Systems , 2004 .
[13] Sang Hyuk Son,et al. Event Detection Services Using Data Service Middleware in Distributed Sensor Networks , 2003, Telecommun. Syst..
[14] Simin Nadjm-Tehrani,et al. ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.
[15] L. Hutwagner,et al. The bioterrorism preparedness and response Early Aberration Reporting System (EARS) , 2003, Journal of Urban Health.
[16] David L Buckeridge,et al. Evaluation of syndromic surveillance systems--design of an epidemic simulation model. , 2004, MMWR supplements.
[17] Akbar M. Sayeed,et al. Detection, Classification and Tracking of Targets in Distributed Sensor Networks , 2002 .
[18] Ambuj K. Singh,et al. Real-time nondestructive structural health monitoring using support vector machines and wavelets , 2005, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.
[19] Mark Gibson,et al. Technologies and Techniques for Early Warning Systems to Monitor and Evaluate Drinking Water Quality: A State-of-the-Art Review , 2005 .
[20] Avi Ostfeld,et al. Optimal Layout of Early Warning Detection Stations for Water Distribution Systems Security , 2004 .
[21] S. Sitharama Iyengar,et al. Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks , 2004, IEEE Transactions on Computers.
[22] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[23] Lorenz T. Biegler,et al. A Mixed Integer Approach for Obtaining Unique Solutions in Source Inversion of Drinking Water Networks , 2005 .
[24] D. Sosin. Draft framework for evaluating syndromic surveillance systems , 2003, Journal of Urban Health.
[25] James G. Uber,et al. The Threat Ensemble Vulnerability Assessment (TEVA) Program for Drinking Water Distribution System Security , 2004 .
[26] Sameer Singh,et al. Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..
[27] Cynthia A. Phillips,et al. A General Integer-Programming-Based Framework for Sensor Placement in Municipal Water Networks , 2004 .
[28] Lee M. Rossey,et al. Extending the DARPA off-line intrusion detection evaluations , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[29] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[30] Xin Chen,et al. Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks , 2005, IWQoS.
[31] Avi Ostfeld,et al. An Early Warning Detection System (EWDS) for Drinking Water Distribution Systems Security , 2003 .
[32] Jun Zhang,et al. Detection of Outbreaks from Time Series Data Using Wavelet Transform , 2003, AMIA.
[33] S. Blount,et al. Lead Visual Information Specialist , 2003 .
[34] Andrew W. Moore,et al. Algorithms for rapid outbreak detection: a research synthesis , 2005, J. Biomed. Informatics.
[35] Peter J. Bickel,et al. A New Methodology for Evaluating Incident Detection Algorithms , 2000 .
[36] J. Pavlin,et al. Bio-ALIRT biosurveillance detection algorithm evaluation. , 2004, MMWR supplements.
[37] Lorenz T. Biegler,et al. Contamination Source Determination for Water Networks , 2005 .
[38] Salvatore J. Stolfo,et al. Distributed data mining in credit card fraud detection , 1999, IEEE Intell. Syst..
[39] David S. Johnson,et al. A theoretician's guide to the experimental analysis of algorithms , 1999, Data Structures, Near Neighbor Searches, and Methodology.
[40] Young-Jin Kim,et al. Multi-dimensional range queries in sensor networks , 2003, SenSys '03.