Event logs are widely used to record the status of high-tech systems, ma...
We present WEARDA, the open source WEARable sensor Data Acquisition soft...
Traditional anomaly detection methods aim to identify objects that devia...
In the past two decades, most research on anomaly detection has focused ...
Event logs are widely used for anomaly detection and prediction in compl...
Rule set learning has long been studied and has recently been frequently...
We introduce the problem of robust subgroup discovery, i.e., finding a s...
In the context of optimization approaches to engineering applications,
t...
Estimating conditional mutual information (CMI) is an essential yet
chal...
The task of subgroup discovery (SD) is to find interpretable description...
Unsupervised discretization is a crucial step in many knowledge discover...
We introduce geometric pattern mining, the problem of finding recurring ...
Interpretable classifiers have recently witnessed an increase in attenti...
In the field of exploratory data mining, local structure in data can be
...
Outlier detection in high-dimensional data is a challenging yet importan...
Pattern sampling has been proposed as a potential solution to the infamo...
Various variants of the well known Covariance Matrix Adaptation Evolutio...