Sciweavers

924 search results - page 80 / 185
» Active Mining of Data Streams
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 2 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
14 years 1 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
FGCS
2007
106views more  FGCS 2007»
13 years 10 months ago
Distributed data mining services leveraging WSRF
The continuous increase of data volumes available from many sources raises new challenges for their effective understanding. Knowledge discovery in large data repositories involv...
Antonio Congiusta, Domenico Talia, Paolo Trunfio
ICCS
2007
Springer
14 years 4 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
ICDM
2010
IEEE
96views Data Mining» more  ICDM 2010»
13 years 8 months ago
Domain-Driven Data Mining for IT Infrastructure Support
Abstract--Support analytics (i.e., statistical analysis, modeling and mining of customer/operations support tickets data) is important in service industries. In this paper, we adop...
Girish Keshav Palshikar, Harrick M. Vin, Mohammed ...