dc.contributor.author | Duong, Quang-Huy | |
dc.contributor.author | Ramampiaro, Heri | |
dc.contributor.author | Nørvåg, Kjetil | |
dc.date.accessioned | 2019-03-04T14:58:37Z | |
dc.date.available | 2019-03-04T14:58:37Z | |
dc.date.created | 2018-07-25T19:24:40Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Applied intelligence (Boston). 2018, 48 (12), 4805-4823. | nb_NO |
dc.identifier.issn | 0924-669X | |
dc.identifier.uri | http://hdl.handle.net/11250/2588570 | |
dc.description.abstract | Detection of changes in streaming data is an important mining task, with a wide range of real-life ap- plications. Numerous algorithms have been proposed to efficiently detect changes in streaming data. However, the limitation of existing algorithms is that they as- sume that data are generated independently. In partic- ular, temporal dependencies of data in a stream are still not thoroughly studied. Motivated by this, in this work we propose a new efficient method to detect changes in streaming data by exploring the temporal dependencies of data in the stream. As part of this, we introduce a new statistical model called the candidate change point (CCP) model, with which the main idea is to compute the probabilities of finding change points in the stream. The computed probabilities are used to generate a dis- tribution, which is, in turn, used in statistical hypoth- esis tests to determine the candidate changes. We use the CCP model to develop a new algorithm called Can- didate Change Point Detector (CCPD), which detects change points in linear time, and is thus applicable for real-time applications. Our extensive experimental eval- uation demonstrates the efficiency and the feasibility of our approach. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.relation.uri | http://www.idi.ntnu.no/~heri/papers/Quang-APIN2018.pdf | |
dc.title | Applying temporal dependence to detect changes in streaming data | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 4805-4823 | nb_NO |
dc.source.volume | 48 | nb_NO |
dc.source.journal | Applied intelligence (Boston) | nb_NO |
dc.source.issue | 12 | nb_NO |
dc.identifier.doi | 10.1007/s10489-018-1254-7 | |
dc.identifier.cristin | 1598696 | |
dc.relation.project | Andre: 548172 | nb_NO |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [Applied intelligence] Locked until 31.7.2019 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/s10489-018-1254-7 | nb_NO |
cristin.unitcode | 194,63,10,0 | |
cristin.unitname | Institutt for datateknologi og informatikk | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 2 | |