Sciweavers

1274 search results - page 66 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
14 years 9 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester
IRMA
2000
13 years 10 months ago
A survey of spatial data mining methods databases and statistics point of views
This paper reviews the data mining methods that are combined with Geographic Information Systems (GIS) for carrying out spatial analysis of geographic data. We will first look at d...
Karine Zeitouni
SDM
2003
SIAM
184views Data Mining» more  SDM 2003»
13 years 10 months ago
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data
The problem of finding clusters in data is challenging when clusters are of widely differing sizes, densities and shapes, and when the data contains large amounts of noise and out...
Levent Ertöz, Michael Steinbach, Vipin Kumar
TNN
1998
121views more  TNN 1998»
13 years 8 months ago
Detection of mines and minelike targets using principal component and neural-network methods
— This paper introduces a new system for real-time detection and classification of arbitrarily scattered surface-laid mines from multispectral imagery data of a minefield. The ...
Xi Miao, Mahmood R. Azimi-Sadjadi, Bin Tan, A. C. ...
ICML
2010
IEEE
13 years 9 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...