Sciweavers

194 search results - page 24 / 39
» A Data Mining Framework for Building Intrusion Detection Mod...
Sort
View
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
13 years 5 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
14 years 8 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu
SDM
2012
SIAM
234views Data Mining» more  SDM 2012»
11 years 10 months ago
On Evaluation of Outlier Rankings and Outlier Scores
Outlier detection research is currently focusing on the development of new methods and on improving the computation time for these methods. Evaluation however is rather heuristic,...
Erich Schubert, Remigius Wojdanowski, Arthur Zimek...
ICCS
2007
Springer
14 years 1 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 11 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst