Bursty and hierarchical structure in streams

J Kleinberg - Proceedings of the eighth ACM SIGKDD international …, 2002 - dl.acm.org
A fundamental problem in text data mining is to extract meaningful structure from document
streams that arrive continuously over time. E-mail and news articles are two natural …

A Poissonian explanation for heavy tails in e-mail communication

RD Malmgren, DB Stouffer… - Proceedings of the …, 2008 - National Acad Sciences
Patterns of deliberate human activity and behavior are of utmost importance in areas as
diverse as disease spread, resource allocation, and emergency response. Because of its …

Adaptive event detection with time-varying poisson processes

A Ihler, J Hutchins, P Smyth - Proceedings of the 12th ACM SIGKDD …, 2006 - dl.acm.org
Time-series of count data are generated in many different contexts, such as web access
logging, freeway traffic monitoring, and security logs associated with buildings. Since this …

[图书][B] Modeling events in time using cascades of Poisson processes

A Simma - 2010 - search.proquest.com
For many applications, the data of interest can be best thought of as events—entities that
occur at a particular moment in time, have features and may in turn trigger the occurrence of …

[PDF][PDF] Fast MCMC sampling for markov jump processes and extensions.

V Rao, YW Teg - Journal of Machine Learning Research, 2013 - jmlr.org
Markov jump processes (or continuous-time Markov chains) are a simple and important
class of continuous-time dynamical systems. In this paper, we tackle the problem of …

[图书][B] Bayesian analysis of stochastic process models

D Insua, F Ruggeri, M Wiper - 2012 - books.google.com
Bayesian analysis of complex models based on stochastic processes has in recent years
become a growing area. This book provides a unified treatment of Bayesian analysis of …

The random walk Metropolis: linking theory and practice through a case study

C Sherlock, P Fearnhead, GO Roberts - 2010 - projecteuclid.org
The random walk Metropolis (RWM) is one of the most common Markov chain Monte Carlo
algorithms in practical use today. Its theoretical properties have been extensively explored …

A Bayesian paradigm for designing intrusion detection systems

SL Scott - Computational statistics & data analysis, 2004 - Elsevier
This article describes a model based approach to designing network intrusion detection
systems. The article considers general methods applicable to many different types of …

From user comments to on-line conversations

C Wang, M Ye, BA Huberman - Proceedings of the 18th ACM SIGKDD …, 2012 - dl.acm.org
We present an analysis of user conversations in on-line social media and their evolution
over time. We propose a dynamic model that predicts the growth dynamics and structural …

An exact Gibbs sampler for the Markov-modulated Poisson process

P Fearnhead, C Sherlock - … the Royal Statistical Society Series B …, 2006 - academic.oup.com
A Markov-modulated Poisson process is a Poisson process whose intensity varies
according to a Markov process. We present a novel technique for simulating from the exact …