Sciweavers

1998 search results - page 266 / 400
» Basic Association Rules
Sort
View
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
16 years 2 months ago
Mining from open answers in questionnaire data
Surveys are an important part of marketing and customer relationship management, and open answers (i.e., answers to open questions) in particular may contain valuable information ...
Hang Li, Kenji Yamanishi
105
Voted
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 9 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
123
Voted
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 8 months ago
Privacy Preserving Market Basket Data Analysis
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
Ling Guo, Songtao Guo, Xintao Wu
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
15 years 8 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
DSOM
2003
Springer
15 years 7 months ago
Eos: An Approach of Using Behavior Implications for Policy-Based Self-Management
Systems are becoming exceedingly complex to manage. As such, there is an increasing trend towards developing systems that are self-managing. Policy-based infrastructures have been ...
Sandeep Uttamchandani, Carolyn L. Talcott, David P...