Sciweavers

1274 search results - page 56 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICDM
2006
IEEE
137views Data Mining» more  ICDM 2006»
14 years 2 months ago
Mining Complex Time-Series Data by Learning Markovian Models
In this paper, we propose a novel and general approach for time-series data mining. As an alternative to traditional ways of designing specific algorithm to mine certain kind of ...
Yi Wang, Lizhu Zhou, Jianhua Feng, Jianyong Wang, ...
ICDM
2005
IEEE
165views Data Mining» more  ICDM 2005»
14 years 2 months ago
Optimizing Constraint-Based Mining by Automatically Relaxing Constraints
In constraint-based mining, the monotone and antimonotone properties are exploited to reduce the search space. Even if a constraint has not such suitable properties, existing algo...
Arnaud Soulet, Bruno Crémilleux
ICDM
2003
IEEE
220views Data Mining» more  ICDM 2003»
14 years 2 months ago
Exploiting Unlabeled Data for Improving Accuracy of Predictive Data Mining
Predictive data mining typically relies on labeled data without exploiting a much larger amount of available unlabeled data. The goal of this paper is to show that using unlabeled...
Kang Peng, Slobodan Vucetic, Bo Han, Hongbo Xie, Z...
DAWAK
2008
Springer
13 years 10 months ago
Is a Voting Approach Accurate for Opinion Mining?
In this paper, we focus on classifying documents according to opinion and value judgment they contain. The main originality of our approach is to combine linguistic pre-processing,...
Michel Plantié, Mathieu Roche, Gérar...
RAID
2001
Springer
14 years 1 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner