Sciweavers

1274 search results - page 140 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 4 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
CORR
2004
Springer
208views Education» more  CORR 2004»
15 years 4 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
BMVC
2010
15 years 2 months ago
Image Topic Discovery with Saliency Detection
This work proposes a biologically inspired approach to integrate latent topic model with saliency detection. Firstly, a saliency detection algorithm is presented to discriminate s...
Zhidong Li, Yang Wang, Jing Chen, Jie Xu, John Lai...
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
15 years 10 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann
DAWAK
2007
Springer
15 years 10 months ago
MOSAIC: A Proximity Graph Approach for Agglomerative Clustering
Representative-based clustering algorithms are quite popular due to their relative high speed and because of their sound theoretical foundation. On the other hand, the clusters the...
Jiyeon Choo, Rachsuda Jiamthapthaksin, Chun-Sheng ...