Sciweavers

1274 search results - page 150 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
PAKDD
2011
ACM
245views Data Mining» more  PAKDD 2011»
14 years 7 months ago
Finding Rare Classes: Adapting Generative and Discriminative Models in Active Learning
Discovering rare categories and classifying new instances of them is an important data mining issue in many fields, but fully supervised learning of a rare class classifier is pr...
Timothy M. Hospedales, Shaogang Gong, Tao Xiang
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
16 years 1 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
MASCOTS
2007
15 years 5 months ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
SIGSOFT
2005
ACM
15 years 10 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
EDBT
2010
ACM
170views Database» more  EDBT 2010»
15 years 7 months ago
Augmenting OLAP exploration with dynamic advanced analytics
Online Analytical Processing (OLAP) is a popular technique for explorative data analysis. Usually, a fixed set of dimensions (such as time, place, etc.) is used to explore and ana...
Benjamin Leonhardi, Bernhard Mitschang, Rubé...