Linked
Winning the KDD99 classification cup: bagged boosting
ACM SIGKDD Explorations Newsletter
KDD-99 classifier learning contest LLSoft's results overview
ACM SIGKDD Explorations Newsletter
Rapid detection of significant spatial clusters
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Visual analysis of human dynamics: an introduction to the special issue
Information Visualization - Special issue on visual analysis of human dynamics
Walking the path: a new journey to explore and discover through visual analytics
Information Visualization - Special issue on visual analysis of human dynamics
Understanding the dynamics of collaborative multi-party discourse
Information Visualization - Special issue on visual analysis of human dynamics
Nature-inspired visualisation of similarity and relationships in human systems and behaviours
Information Visualization - Special issue on visual analysis of human dynamics
Feature hiding in 3D human body scans
Information Visualization - Special issue on visual analysis of human dynamics
BioSim-a biomedical character-based problem solving environment
Future Generation Computer Systems
ADWICE – anomaly detection with real-time incremental clustering
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Wireless local area network positioning
Ambient Intelligence for Scientific Discovery
Hi-index | 0.00 |
We present an interactive visualization and clustering algorithm that reveals real-time network anomalous events. In the model, glyphs are defined with multiple network attributes and clustered with a recursive optimization algorithm for dimensional reduction. The user's visual latency time is incorporated into the recursive process so that it updates the display and the optimization model according to a human-based delay factor and maximizes the capacity of real-time computation. The interactive search interface is developed to enable the display of similar data points according to the degree of their similarity of attributes. Finally, typical network anomalous events are analyzed and visualized such as password guessing, etc. This technology is expected to have an impact on visual real-time data mining for network security, sensor networks and many other multivariable real-time monitoring systems.