Sciweavers

89 search results - page 13 / 18
» A Framework for Data and Mined Knowledge Interoperability in...
Sort
View
CASDMKM
2004
Springer
131views Data Mining» more  CASDMKM 2004»
14 years 24 days ago
XML-Based Schemes for Business Project Portfolio Selection
Abstract. Many methodologies have been introduced to deal with project portfolio selection problem including some techniques that help to evaluate individual projects, or to select...
Jichang Dong, Kin Keung Lai, Shouyang Wang
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 2 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
CBMS
2008
IEEE
14 years 1 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 11 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 7 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof