Sciweavers

1274 search results - page 106 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
COMAD
2008
15 years 5 months ago
Disk-Based Sampling for Outlier Detection in High Dimensional Data
We propose an efficient sampling based outlier detection method for large high-dimensional data. Our method consists of two phases. In the first phase, we combine a "sampling...
Timothy de Vries, Sanjay Chawla, Pei Sun, Gia Vinh...
EDBT
2004
ACM
110views Database» more  EDBT 2004»
16 years 4 months ago
Using Convolution to Mine Obscure Periodic Patterns in One Pass
The mining of periodic patterns in time series databases is an interesting data mining problem that can be envisioned as a tool for forecasting and predicting the future behavior o...
Mohamed G. Elfeky, Walid G. Aref, Ahmed K. Elmagar...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 5 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
MASS
2010
157views Communications» more  MASS 2010»
15 years 1 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
125
Voted
ISIP
2008
IEEE
15 years 10 months ago
An Approach Towards the Integration of Adaptive Business Intelligent and Constraint Programming
Adaptive Business Intelligence is the discipline that combines prediction, optimization and adaptability into a system answering two important questions: What would probably happe...
José Miguel Rubio, Broderick Crawford