Sciweavers

226 search results - page 38 / 46
» Application of Data Mining to Network Intrusion Detection: C...
Sort
View
KDD
2008
ACM
259views Data Mining» more  KDD 2008»
14 years 8 months ago
Using ghost edges for classification in sparsely labeled networks
We address the problem of classification in partially labeled networks (a.k.a. within-network classification) where observed class labels are sparse. Techniques for statistical re...
Brian Gallagher, Hanghang Tong, Tina Eliassi-Rad, ...
MSWIM
2006
ACM
14 years 1 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
14 years 8 months ago
Extracting key-substring-group features for text classification
In many text classification applications, it is appealing to take every document as a string of characters rather than a bag of words. Previous research studies in this area mostl...
Dell Zhang, Wee Sun Lee
CVPR
2009
IEEE
15 years 2 months ago
Shape Analysis with Conformal Invariants for Multiply Connected Domains and its Application to Analyzing Brain Morphology
All surfaces can be classified by the conformal equivalence relation. Conformal invariants, which are shape indices that can be defined intrinsically on a surface, may be used t...
Paul M. Thompson, Tony F. Chan, Xianfeng Gu, Yalin...
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
14 years 2 days ago
Grouped graphical Granger modeling methods for temporal causal modeling
We develop and evaluate an approach to causal modeling based on time series data, collectively referred to as“grouped graphical Granger modeling methods.” Graphical Granger mo...
Aurelie C. Lozano, Naoki Abe, Yan Liu, Saharon Ros...