Sciweavers

1998 search results - page 102 / 400
» Basic Association Rules
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
BIRTHDAY
2008
Springer
14 years 11 hour ago
Approximating Behaviors in Embedded System Design
Embedded systems are electronic devices that function in the context of a physical environment, by sensing and reacting to a set of stimuli. To simplify the design of embedded syst...
Roberto Passerone, Alberto L. Sangiovanni-Vincente...
JIIS
2002
119views more  JIIS 2002»
13 years 9 months ago
Spatio-Temporal Data Mining for Typhoon Image Collection
Our research aims at discovering useful knowledge from the large collection of satellite images of typhoons using data mining approaches. We first introduce the creation of the typ...
Asanobu Kitamoto
CIKM
2004
Springer
14 years 3 months ago
Discovering frequently changing structures from historical structural deltas of unordered XML
Recently, a large amount of work has been done in XML data mining. However, we observed that most of the existing works focus on the snapshot XML data, while XML data is dynamic i...
Qiankun Zhao, Sourav S. Bhowmick, Mukesh K. Mohani...
EUROPKI
2004
Springer
14 years 3 months ago
Trustworthy Accounting for Wireless LAN Sharing Communities
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...
Elias C. Efstathiou, George C. Polyzos