The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kimmo Hätönen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kimmo Hätönen, Mika Klemettinen, Heikki Mannila, Pirjo Ronkainen, Hannu Toivonen
    Knowledge Discovery from Telecommunication Network Alarm Databases. [Citation Graph (4, 5)][DBLP]
    ICDE, 1996, pp:115-122 [Conf]
  2. Kimmo Hätönen, Mika Klemettinen
    Domain Structures in Filtering Irrelevant Frequent Patterns. [Citation Graph (0, 0)][DBLP]
    Database Support for Data Mining Applications, 2004, pp:289-305 [Conf]
  3. Kimmo Hätönen, Mika Klemettinen, Markus Miettinen
    Remarks on the Industrial Application of Inductive Database Technologies. [Citation Graph (0, 0)][DBLP]
    Constraint-Based Mining and Inductive Databases, 2004, pp:196-215 [Conf]
  4. Kimmo Hätönen, Jean-François Boulicaut, Mika Klemettinen, Markus Miettinen, Cyrille Masson
    Comprehensive Log Compression with Frequent Patterns. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2003, pp:360-370 [Conf]
  5. Albert J. Höglund, Kimmo Hätönen, Antti S. Sorvari
    A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. [Citation Graph (0, 0)][DBLP]
    IJCNN (5), 2000, pp:411-416 [Conf]
  6. Kimmo Hätönen, Perttu Halonen, Mika Klemettinen, Markus Miettinen
    Queryable Lossless Log Database Compression. [Citation Graph (0, 0)][DBLP]
    KDID, 2003, pp:70-79 [Conf]
  7. Kimmo Hätönen, Mika Klemettinen
    Domain Structures in Filtering Irrelevant Frequent Patterns. [Citation Graph (0, 0)][DBLP]
    KDID, 2002, pp:50-60 [Conf]
  8. Jukka K. Nurminen, Olli Karonen, Kimmo Hätönen
    What makes expert systems survive over 10 years - empirical evaluation of several engineering applications. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2003, v:24, n:2, pp:199-211 [Journal]

  9. Computer Log Anomaly Detection Using Frequent Episodes. [Citation Graph (, )][DBLP]


  10. Towards holistic security management through coherent measuring. [Citation Graph (, )][DBLP]


  11. Towards an abstraction layer for security assurance measurements: (invited paper). [Citation Graph (, )][DBLP]


Search in 0.036secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002