Sciweavers

1274 search results - page 53 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
JCIT
2008
165views more  JCIT 2008»
13 years 8 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
KDD
2010
ACM
275views Data Mining» more  KDD 2010»
14 years 3 days ago
Combined regression and ranking
Many real-world data mining tasks require the achievement of two distinct goals when applied to unseen data: first, to induce an accurate preference ranking, and second to give g...
D. Sculley
PKDD
2009
Springer
174views Data Mining» more  PKDD 2009»
14 years 3 months ago
Active and Semi-supervised Data Domain Description
Data domain description techniques aim at deriving concise descriptions of objects belonging to a category of interest. For instance, the support vector domain description (SVDD) l...
Nico Görnitz, Marius Kloft, Ulf Brefeld
WAIM
2010
Springer
13 years 6 months ago
An Efficient Approach for Mining Segment-Wise Intervention Rules in Time-Series Streams
Huge time-series stream data are collected every day from many areas, and their trends may be impacted by outside events, hence biased from its normal behavior. This phenomenon is ...
Yue Wang, Jie Zuo, Ning Yang, Lei Duan, Hong-Jun L...
SDM
2012
SIAM
312views Data Mining» more  SDM 2012»
11 years 11 months ago
Drought Detection of the Last Century: An MRF-based Approach
Droughts are one of the most damaging climate-related hazards. The late 1960s Sahel drought in Africa and the North American Dust Bowl of the 1930s are two examples of severe drou...
Qiang Fu, Arindam Banerjee, Stefan Liess, Peter K....