Sciweavers

822 search results - page 142 / 165
» Case Mining from Large Databases
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 1 months ago
Survey of Strategic Alignment Impacts on Organizational Performance in International European Companies
act The strategic use of technology based information systems (IS/IT) is a fundamental issue for every business. This is particularly true in the case of firms that engage in inter...
Hajer Kefi, Michel Kalika
CIKM
2005
Springer
14 years 1 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...
AAI
2007
132views more  AAI 2007»
13 years 8 months ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...
VLDB
2004
ACM
103views Database» more  VLDB 2004»
14 years 1 months ago
WIC: A General-Purpose Algorithm for Monitoring Web Information Sources
The Web is becoming a universal information dissemination medium, due to a number of factors including its support for content dynamicity. A growing number of Web information prov...
Sandeep Pandey, Kedar Dhamdhere, Christopher Olsto...