Sciweavers

1274 search results - page 100 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
16 years 4 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
WSCG
2004
170views more  WSCG 2004»
15 years 5 months ago
Geo-Spatial Data Viewer: From Familiar Land-covering to Arbitrary Distorted Geo-Spatial Quadtree Maps
In many application domains, data is collected and referenced by its geo-spatial location. Spatial data mining, or the discovery of interesting patterns in such databases, is an i...
Daniel A. Keim, Christian Panse, Jörn Schneid...
KDD
2010
ACM
279views Data Mining» more  KDD 2010»
15 years 8 months ago
Unifying dependent clustering and disparate clustering for non-homogeneous data
Modern data mining settings involve a combination of attributevalued descriptors over entities as well as specified relationships between these entities. We present an approach t...
M. Shahriar Hossain, Satish Tadepalli, Layne T. Wa...
BMCBI
2011
14 years 7 months ago
Study of large and highly stratified population datasets by combining iterative pruning principal component analysis and STRUCTU
Background: The ever increasing sizes of population genetic datasets pose great challenges for population structure analysis. The Tracy-Widom (TW) statistical test is widely used ...
Tulaya Limpiti, Apichart Intarapanich, Anunchai As...
CAISE
2006
Springer
15 years 7 months ago
Data Conceptualisation for Web-Based Data-Centred Application Design
The paper describes the conceptualisation process in the ReQuest approach, a wide-spectrum methodology for web-based information systems analysis and development. This methodology ...
Julien Vilz, Anne-France Brogneaux, Ravi Ramdoyal,...