Sciweavers

922 search results - page 64 / 185
» A data mining approach to database compression
Sort
View
IEEEIAS
2009
IEEE
15 years 10 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ICDM
2008
IEEE
96views Data Mining» more  ICDM 2008»
15 years 10 months ago
Filling in the Blanks - Krimp Minimisation for Missing Data
Many data sets are incomplete. For correct analysis of such data, one can either use algorithms that are designed to handle missing data or use imputation. Imputation has the bene...
Jilles Vreeken, Arno Siebes
PAKDD
2007
ACM
115views Data Mining» more  PAKDD 2007»
15 years 10 months ago
Intelligent Sequential Mining Via Alignment: Optimization Techniques for Very Large DB
The shear volume of the results in traditional support based frequent sequential pattern mining methods has led to increasing interest in new intelligent mining methods to find mo...
Hye-Chung Kum, Joong Hyuk Chang, Wei Wang 0010
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
16 years 4 months ago
Effective and efficient itemset pattern summarization: regression-based approaches
In this paper, we propose a set of novel regression-based approaches to effectively and efficiently summarize frequent itemset patterns. Specifically, we show that the problem of ...
Ruoming Jin, Muad Abu-Ata, Yang Xiang, Ning Ruan
RCIS
2010
15 years 2 months ago
A Tree-based Approach for Efficiently Mining Approximate Frequent Itemsets
—The strategies for mining frequent itemsets, which is the essential part of discovering association rules, have been widely studied over the last decade. In real-world datasets,...
Jia-Ling Koh, Yi-Lang Tu