Sciweavers

1274 search results - page 54 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
FLAIRS
2001
13 years 10 months ago
Data Mining with Distributed Agents in E-Commerce Applications
In this paperwedescribe the prototypeof a yellowpageservice for customersin a distributed cyber-shoppingmall. This application combines distributed data miningwith agent technolog...
Yugyung Lee, James Geller, Eun Kyo Park, Changgyu ...
ICCS
2003
Springer
14 years 1 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
DGO
2003
137views Education» more  DGO 2003»
13 years 10 months ago
Time-Series Data Mining in a Geospatial Decision Support
This paper presents an overview of the motivation for, and the use of time-series data mining in, a Geospatial Decision Support System (GDSS). Our approach is based on a combinati...
Dan Li, Sherri K. Harms, Steve Goddard, William J....
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 8 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
HAIS
2009
Springer
14 years 1 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...