Sciweavers

1274 search results - page 134 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
MVA
1992
15 years 5 months ago
A Hybrid Approach towards Segmentation of Range Images
This paper presents a technique for the segmentation of range images. It tends to be a hybrid approach that combines edge detection and region growing techniques toward accomplish...
Alan Wui Tze Lim, Eam Khwang Teoh, Dinesh P. Mital
ICDM
2010
IEEE
201views Data Mining» more  ICDM 2010»
15 years 2 months ago
Mining Closed Strict Episodes
Discovering patterns in a sequence is an important aspect of data mining. One popular choice of such patterns are episodes, patterns in sequential data describing events that often...
Nikolaj Tatti, Boris Cule
INCDM
2007
Springer
97views Data Mining» more  INCDM 2007»
15 years 10 months ago
Clustering by Random Projections
Abstract. Clustering algorithms for multidimensional numerical data must overcome special difficulties due to the irregularities of data distribution. We present a clustering algo...
Thierry Urruty, Chabane Djeraba, Dan A. Simovici
WWW
2004
ACM
16 years 4 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao