Fast Algorithms for Outlier Detection. Fast Algorithms for Outlier Detection.

Fast Algorithms for Outlier Detection‪.‬

Journal of Computer Science 2008, Feb, 4, 2

    • $5.99
    • $5.99

Publisher Description

INTRODUCTION Outlier detection has many practical applications in different domains. In many data mining applications, identifying exceptions or rare events can often lead to the discovery of unexpected knowledge in areas such as fraud detection (1), identifying computer network intrusions and bottlenecks (2) and criminal activities in E-commerce and detection of suspicious activities (3).

GENRE
Computing & Internet
RELEASED
2008
1 February
LANGUAGE
EN
English
LENGTH
9
Pages
PUBLISHER
Science Publications
SELLER
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
151.4
KB
Similarity Search and Applications Similarity Search and Applications
2017
Similarity Search and Applications Similarity Search and Applications
2020
Similarity Search and Applications Similarity Search and Applications
2018
Similarity Search and Applications Similarity Search and Applications
2019
Similarity Search and Applications Similarity Search and Applications
2021
Similarity Search and Applications Similarity Search and Applications
2016
Wifi Technology: Future Market Challenges and Opportunities. Wifi Technology: Future Market Challenges and Opportunities.
2006
A Fast Approximate String Searching Algorithm. A Fast Approximate String Searching Algorithm.
2005
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
2007
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011