Sciweavers

194 search results - page 26 / 39
» A Data Mining Framework for Building Intrusion Detection Mod...
Sort
View
CASDMKM
2004
Springer
131views Data Mining» more  CASDMKM 2004»
14 years 1 months ago
XML-Based Schemes for Business Project Portfolio Selection
Abstract. Many methodologies have been introduced to deal with project portfolio selection problem including some techniques that help to evaluate individual projects, or to select...
Jichang Dong, Kin Keung Lai, Shouyang Wang
GFKL
2007
Springer
148views Data Mining» more  GFKL 2007»
14 years 1 months ago
Information Integration of Partially Labeled Data
Abstract. A central task when integrating data from different sources is to detect identical items. For example, price comparison websites have to identify offers for identical p...
Steffen Rendle, Lars Schmidt-Thieme
ICAI
2004
13 years 9 months ago
Inductive System Health Monitoring
- The Inductive Monitoring System (IMS) software was developed to provide a technique to automatically produce health monitoring knowledge bases for systems that are either difficu...
David L. Iverson
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
KDD
2009
ACM
217views Data Mining» more  KDD 2009»
14 years 8 months ago
Efficient anomaly monitoring over moving object trajectory streams
Lately there exist increasing demands for online abnormality monitoring over trajectory streams, which are obtained from moving object tracking devices. This problem is challengin...
Yingyi Bu, Lei Chen 0002, Ada Wai-Chee Fu, Dawei L...