Sciweavers

1274 search results - page 126 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
129
Voted
PKDD
2007
Springer
134views Data Mining» more  PKDD 2007»
15 years 10 months ago
Polyp Detection in Endoscopic Video Using SVMs
Colon cancer is one of the most common cancers in developed countries. Most of these cancers start with a polyp. Polyps are easily detected by physicians. Our goal is to mimic this...
Luís A. Alexandre, João Casteleiro, ...
JMLR
2010
145views more  JMLR 2010»
14 years 11 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
WWW
2008
ACM
16 years 4 months ago
Hidden sentiment association in chinese web opinion mining
The boom of product review websites, blogs and forums on the web has attracted many research efforts on opinion mining. Recently, there was a growing interest in the finergrained ...
Qi Su, Xinying Xu, Honglei Guo, Zhili Guo, Xian Wu...
CHI
2005
ACM
16 years 4 months ago
Interactive web usage mining with the navigation visualizer
Web usage mining, the analysis of user navigation paths through web sites, is a common technique for evaluating site designs or adaptive hypermedia techniques. However, often it i...
Eelco Herder, Harald Weinreich
ANSS
2006
IEEE
15 years 10 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...