Sciweavers

76 search results - page 5 / 16
» Analysis of Firewall Policy Rules Using Data Mining Techniqu...
Sort
View
AAAI
1996
13 years 8 months ago
Post-Analysis of Learned Rules
Rule induction research implicitly assumes that after producing the rules from a dataset, these rules will be used directly by an expert system or a human user. In real-life appli...
Bing Liu, Wynne Hsu
BTW
1999
Springer
145views Database» more  BTW 1999»
13 years 11 months ago
A Multi-Tier Architecture for High-Performance Data Mining
Data mining has been recognised as an essential element of decision support, which has increasingly become a focus of the database industry. Like all computationally expensive data...
Ralf Rantzau, Holger Schwarz
CBMS
2007
IEEE
14 years 1 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
KDD
2002
ACM
173views Data Mining» more  KDD 2002»
14 years 7 months ago
LumberJack: Intelligent Discovery and Analysis of Web User Traffic Composition
Web Usage Mining enables new understanding of user goals on the Web. This understanding has broad applications, and traditional mining techniques such as association rules have bee...
Ed Huai-hsin Chi, Adam Rosien, Jeffrey Heer
WISE
2005
Springer
14 years 9 days ago
A Web Recommendation Technique Based on Probabilistic Latent Semantic Analysis
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of clickstream data will lead to capture usag...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou