Sciweavers

76 search results - page 14 / 16
» Analysis of Firewall Policy Rules Using Data Mining Techniqu...
Sort
View
DEBU
2008
186views more  DEBU 2008»
13 years 6 months ago
A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke
EUC
2005
Springer
14 years 3 days ago
Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing
Advanced analysis of data for extracting useful knowledge is the next natural step in the world of ubiquitous computing. So far, most of the ubiquitous systems process knowledge in...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
DATAMINE
1999
108views more  DATAMINE 1999»
13 years 6 months ago
A Survey of Methods for Scaling Up Inductive Algorithms
Abstract. One of the de ning challenges for the KDD research community is to enable inductive learning algorithms to mine very large databases. This paper summarizes, categorizes, ...
Foster J. Provost, Venkateswarlu Kolluri
SAC
2010
ACM
14 years 1 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
POPL
2003
ACM
14 years 6 months ago
Discovering affine equalities using random interpretation
We present a new polynomial-time randomized algorithm for discovering affine equalities involving variables in a program. The key idea of the algorithm is to execute a code fragme...
Sumit Gulwani, George C. Necula