Learn More
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of detecting novel attacks. However, the use of anomaly detection in practice is hampered by a high rate of false alarms. Specification-based techniques have been shown to produce a low rate of false alarms, but are not as effective as anomaly detection in(More)
PURPOSE Previously, several quantitative trait loci (QTL) that influence age-related retinal degeneration (ageRD) were demonstrated in a cross between the C57BL/6J-c(2J) and BALB/cByJ strains (B x C). In this study, as a complementary approach to ongoing recombinant progeny testing for the purpose of identifying candidate quantitative trait genes (QTG), a(More)
Process mining techniques have been used to analyze event logs from information systems in order to derive useful patterns. However, in the big data era, real-life event logs are huge, unstructured, and complex so that traditional process mining techniques have difficulties in the analysis of big logs. To reduce the complexity during the analysis, trace(More)
Zusammenfassung Conjugate Gradient Methods for the Rayleigh Quotient Minimization of Generalized Eigenvalue Problems. Here we consider a modified version of the Rayleigh quotient conjugate gradient method of Bradbury and Fletcher for the computation of the smallest eigenvalue and a corresponding eigenvector of Ax = 2Bx, where A and B are real symmetric and(More)