Sciweavers

490 search results - page 76 / 98
» Association rules mining using heavy itemsets
Sort
View
FLAIRS
2004
13 years 11 months ago
Personalization Using Hybrid Data Mining Approaches in E-Business Applications
Effective personalization is greatly demanded in highly heterogeneous and diverse e-commerce domain. In our approach we rely on the idea that an effective personalization techniqu...
Olena Parkhomenko, Yugyung Lee, Chintan Patel
RAID
1999
Springer
14 years 2 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 2 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
WCRE
2010
IEEE
13 years 8 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 10 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel