Sciweavers

1274 search results - page 142 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICDE
2004
IEEE
133views Database» more  ICDE 2004»
16 years 5 months ago
GenExplore: Interactive Exploration of Gene Interactions from Microarray Data
DNA Microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Yong Ye, Xintao Wu, Kalpathi R. Subramanian, Liyin...
ICDM
2008
IEEE
143views Data Mining» more  ICDM 2008»
15 years 10 months ago
Exploiting Data Semantics to Discover, Extract, and Model Web Sources
We describe DEIMOS, a system that automatically discovers and models new sources of information. The system exploits four core technologies developed by our group that makes an en...
José Luis Ambite, Craig A. Knoblock, Kristi...
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 10 months ago
Privacy-Preserving k-NN for Small and Large Data Sets
It is not surprising that there is strong interest in kNN queries to enable clustering, classification and outlierdetection tasks. However, previous approaches to privacypreservi...
Artak Amirbekyan, Vladimir Estivill-Castro
UM
2010
Springer
15 years 9 months ago
Detecting Gaming the System in Constraint-Based Tutors
Recently, detectors of gaming the system have been developed for several intelligent tutoring systems where the problem-solving process is reified, and gaming consists of systemati...
Ryan S. J. d. Baker, Antonija Mitrovic, Moffat Mat...
SIGSOFT
2007
ACM
16 years 5 months ago
Recommending random walks
We improve on previous recommender systems by taking advantage of the layered structure of software. We use a random-walk approach, mimicking the more focused behavior of a develo...
Zachary M. Saul, Vladimir Filkov, Premkumar T. Dev...