Sciweavers

1274 search results - page 72 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
AUSDM
2008
Springer
230views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Combining Structure and Content Similarities for XML Document Clustering
This paper proposes a clustering approach that explores both the content and the structure of XML documents for determining similarity among them. Assuming that the content and th...
Tien Tran, Richi Nayak, Peter Bruza
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
14 years 2 months ago
A New Approach for Reactive Web Usage Data Processing
— Web usage mining exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web (WWW) users. The required information is captured b...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar
DMIN
2006
131views Data Mining» more  DMIN 2006»
13 years 10 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
BILDMED
2009
130views Algorithms» more  BILDMED 2009»
13 years 10 months ago
Feature Processing for Automatic Anatomical Landmark Detection Using Reservoir Networks
We present an approach to the combination of an arbitrary number of image features to produce more sophisticated features for anatomical landmark detection. The combination was don...
Benjamin Roeschies, Susanne Winter
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
13 years 7 months ago
On optimal AUV track-spacing for underwater mine detection
— This work addresses the task of designing the optimal survey route that an autonomous underwater vehicle (AUV) should take in mine countermeasures (MCM) operations. It is assum...
David P. Williams