Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 425-429.doi: 10.11896/j.issn.1002-137X.2016.6A.101
Previous Articles Next Articles
WANG Yu-ling and REN Yong-gong
[1] Liu Si-yuan,Chen Lei,Ni L M.Anomaly detection from incomeplete data[J].ACM Transactions on Knowledge Discovery from Data,2014,9(2):1-22 [2] 黄凯奇,陈晓棠.智能视频监控技术[J].计算机学报,2014,7(49):1093-1118 [3] Faloutsos B C,Plant C.Outlier-robust clustering using inde-pendent components[C]∥ Proceedings of the 34th ACM SIGMOD International Conference on Management of Data.Vancouver B C.Canada,2008:185-198 [4] DiLorenzo C G,Liu L.Estimating origin destination flows using opportunistically collected mobile phone location data from one million users in Boston Metropolitan Area[J].IEEE Pervasive Computing,2011,1(10):109-133 [5] Kumar C R,Tomkins A.Evolutionary clustering[C]∥Procee-dings of the 12th ACM SIGKDD International Conference on knowledge Discovery and Data.Philadelphia,USA,2006:554-560 [6] Aggarwal,Yu P S.A framework for clustering uncertain datastreams[C]∥Proceedings of the IEEE 24thInternatiional Conference on Data Engineering.New York,USA,2008:150-159 [7] Leung W T,Lee D L,Lee W C.Acollaborative location recommendation framework based on co-clustering[C]∥Proceedings of the 34th ACM SIGIR Conference on Research and Development in Information Retrieval.2011:305-314 [8] Singh,Sayal M.Privately detecting bursts in streaming,distributed time series data[J].Data and Knowledge Engineering,2009,8(6):509-530 [9] Chen B L,Fu A W C.Efficient anomaly monitoring over moving object trajectory streams[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2009:159-168 [10] Zeng S D,Chen H.Burst detection from multiple data streams:A network-based approach[J].IEEE Transactions on Systems,Man,and Cybernetics,2010,0(3):258-267 [11] Ros A I,Assogba Y.Detecting outlier sections in us congressional legislation[C]∥Proceedings of the 34th ACM SIGIR Conference.2011:235-244 [12] Pang X,Chawla S,Liu W,et al.On detection of emerging ano-malous traffic patterns using GPS data[J].Data and Knowledge Engineering,2013,27:509-530 [13] Chawla S,Zheng Yu,Hu Jia-feng.Inferring the root cause in road traffic anomalies[C]∥Proceedings of the IEEE 12th International Conference on Data Mining.Beijing,China,2012 [14] Xiong G H,Liu C,Zhou Z H.A taxi driving fraud detection system[C]∥Proceedings of the IEEE 11th International Confe-rence on Data Mining.2011:181-190 [15] Chen M T,Oria O V.Robust and fast similarity search for mo-ving object trajectories[C]∥Proceedings of the 31th ACM SIGMOD International Conference on Management of Data,Baltimore,USA,2005:491-502 [16] Monreale F,Tresarti P R,Giannotti F.WhereNext:A location predictor on trajectory pattern mining[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Paris,France,2009:637-646 [17] Liu Y,Ni L,Fan J.Towards mobility-based clustering[C]∥Proceedings of the 16th ACM SIGKDD International Confe-rence on Knowledge Discovery and Data Mining.Washington DC,USA,2010 [18] Aggarwal C,Yu P S.A framework for clustering uncertain data streams[C]∥Proceedings of the IEEE 24th International Conference on Data Engineering.New York,USA,2008:150-159 [19] Klan K D.Adaptive burst detection in a stream engine[J].Proceedings of the 24th ACM Symposium on Applied Computing,2009,8(12):1511-1515 |
No related articles found! |
|