Sciweavers

1274 search results - page 103 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
FLAIRS
2010
15 years 6 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves
KDD
2003
ACM
156views Data Mining» more  KDD 2003»
16 years 4 months ago
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
Defining outliers by their distance to neighboring examples is a popular approach to finding unusual examples in a data set. Recently, much work has been conducted with the goal o...
Stephen D. Bay, Mark Schwabacher
CIKM
2006
Springer
15 years 7 months ago
A fast and robust method for web page template detection and removal
The widespread use of templates on the Web is considered harmful for two main reasons. Not only do they compromise the relevance judgment of many web IR and web mining methods suc...
Karane Vieira, Altigran Soares da Silva, Nick Pint...
SDM
2004
SIAM
187views Data Mining» more  SDM 2004»
15 years 5 months ago
Class-Specific Ensembles for Active Learning
In many real-world tasks of image classification, limited amounts of labeled data are available to train automatic classifiers. Consequently, extensive human expert involvement is...
Amit Mandvikar, Huan Liu
HUC
2009
Springer
15 years 8 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...