Sciweavers

76 search results - page 13 / 16
» Analysis of Firewall Policy Rules Using Data Mining Techniqu...
Sort
View
CSDA
2008
128views more  CSDA 2008»
13 years 6 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
LAWEB
2006
IEEE
14 years 21 days ago
Analysis of Web Search Engine Clicked Documents
In this paper we process and analyze web search engine query and click data from the perspective of the documents (URL’s) selected. We initially define possible document categor...
David F. Nettleton, Liliana Calderón-Benavi...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 7 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
AUSDM
2008
Springer
258views Data Mining» more  AUSDM 2008»
13 years 8 months ago
wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability
Accurate and less invasive personalized predictive medicine can spare many breast cancer patients from receiving complex surgical biopsies, unnecessary adjuvant treatments and its...
Umer Khan, Hyunjung Shin, Jongpill Choi, Minkoo Ki...
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
13 years 10 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu