Sciweavers

357 search results - page 46 / 72
» Anomaly Detection Using Process Mining
Sort
View
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
14 years 3 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
14 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
ICASSP
2009
IEEE
14 years 1 months ago
Principal component analysis in decomposable Gaussian graphical models
We consider principal component analysis (PCA) in decomposable Gaussian graphical models. We exploit the prior information in these models in order to distribute its computation. ...
Ami Wiesel, Alfred O. Hero III
NIPS
2008
13 years 11 months ago
Empirical performance maximization for linear rank statistics
The ROC curve is known to be the golden standard for measuring performance of a test/scoring statistic regarding its capacity of discrimination between two populations in a wide v...
Stéphan Clémençon, Nicolas Va...
EMNLP
2009
13 years 7 months ago
Detecting Speculations and their Scopes in Scientific Text
Distinguishing speculative statements from factual ones is important for most biomedical text mining applications. We introduce an approach which is based on solving two sub-probl...
Arzucan Özgür, Dragomir R. Radev