Sciweavers

1274 search results - page 52 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
AMR
2007
Springer
159views Multimedia» more  AMR 2007»
14 years 2 months ago
Automatically Detecting Members and Instrumentation of Music Bands Via Web Content Mining
Abstract. In this paper, we present an approach to automatically detecting music band members and instrumentation using web content mining techniques. To this end, we combine a nam...
Markus Schedl, Gerhard Widmer
CEC
2008
IEEE
14 years 3 months ago
Distributed multi-relational data mining based on genetic algorithm
—An efficient algorithm for mining important association rule from multi-relational database using distributed mining ideas. Most existing data mining approaches look for rules i...
Wenxiang Dou, Jinglu Hu, Kotaro Hirasawa, Gengfeng...
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
14 years 5 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
IDA
2010
Springer
14 years 21 days ago
Deterministic Finite Automata in the Detection of EEG Spikes and Seizures
This Paper presents a platform to mine epileptiform activity from Electroencephalograms (EEG) by combining the methodologies of Deterministic Finite Automata (DFA) and Knowledge Di...
Rory A. Lewis, Doron Shmueli, Andrew M. White
CSREASAM
2003
13 years 10 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen