Sciweavers

706 search results - page 59 / 142
» A Methodology for Evaluating and Selecting Data Mining Softw...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
ASPDAC
2007
ACM
108views Hardware» more  ASPDAC 2007»
13 years 12 months ago
Software Performance Estimation in MPSoC Design
- Estimation tools are a key component of system-level methodologies, enabling a fast design space exploration. Estimation of software performance is essential in current software-...
Márcio Oyamada, Flávio Rech Wagner, ...
SDM
2012
SIAM
307views Data Mining» more  SDM 2012»
11 years 10 months ago
Pseudo Cold Start Link Prediction with Multiple Sources in Social Networks
Link prediction is an important task in social networks and data mining for understanding the mechanisms by which the social networks form and evolve. In most link prediction rese...
Liang Ge, Aidong Zhang
KDD
1999
ACM
237views Data Mining» more  KDD 1999»
14 years 5 days ago
Using Association Rules for Product Assortment Decisions: A Case Study
It has been claimed that the discovery of association rules is well-suited for applications of market basket analysis to reveal regularities in the purchase behaviour of customers...
Tom Brijs, Gilbert Swinnen, Koen Vanhoof, Geert We...
IUI
2005
ACM
14 years 1 months ago
Building intelligent shopping assistants using individual consumer models
This paper describes an Intelligent Shopping Assistant designed for a shopping cart mounted tablet PC that enables individual interactions with customers. We use machine learning ...
Chad M. Cumby, Andrew E. Fano, Rayid Ghani, Marko ...