Sciweavers

1274 search results - page 146 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
BMCBI
2007
167views more  BMCBI 2007»
15 years 4 months ago
Applying negative rule mining to improve genome annotation
Background: Unsupervised annotation of proteins by software pipelines suffers from very high error rates. Spurious functional assignments are usually caused by unwarranted homolog...
Irena I. Artamonova, Goar Frishman, Dmitrij Frishm...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
16 years 1 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
CVPR
2009
IEEE
15 years 11 months ago
Automatic fetal face detection from ultrasound volumes via learning 3D and 2D information
3D ultrasound imaging has been increasingly used in clinics for fetal examination. However, manually searching for the optimal view of the fetal face in 3D ultrasound volumes is c...
Shaolei Feng, Shaohua Kevin Zhou, Sara Good, Dorin...
WPES
2006
ACM
15 years 10 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
NIPS
2007
15 years 5 months ago
Mining Internet-Scale Software Repositories
Large repositories of source code create new challenges and opportunities for statistical machine learning. Here we first develop Sourcerer, an infrastructure for the automated c...
Erik Linstead, Paul Rigor, Sushil Krishna Bajracha...