Sciweavers

1274 search results - page 73 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2003
ACM
195views Data Mining» more  KDD 2003»
14 years 9 months ago
Visualizing changes in the structure of data for exploratory feature selection
Using visualization techniques to explore and understand high-dimensional data is an efficient way to combine human intelligence with the immense brute force computation power ava...
Elias Pampalk, Werner Goebl, Gerhard Widmer
ICDM
2007
IEEE
136views Data Mining» more  ICDM 2007»
14 years 3 months ago
Dynamic Micro Targeting: Fitness-Based Approach to Predicting Individual Preferences
It is crucial to segment customers intelligently in order to offer more targeted and personalized products and services. Traditionally, customer segmentation is achieved using sta...
Tianyi Jiang, Alexander Tuzhilin
IWPC
2010
IEEE
13 years 7 months ago
Using Data Fusion and Web Mining to Support Feature Location in Software
—Data fusion is the process of integrating multiple sources of information such that their combination yields better results than if the data sources are used individually. This ...
Meghan Revelle, Bogdan Dit, Denys Poshyvanyk
KDD
2004
ACM
195views Data Mining» more  KDD 2004»
14 years 9 months ago
Improved robustness of signature-based near-replica detection via lexicon randomization
Detection of near duplicate documents is an important problem in many data mining and information filtering applications. When faced with massive quantities of data, traditional d...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
KDD
2004
ACM
211views Data Mining» more  KDD 2004»
14 years 9 months ago
Towards parameter-free data mining
Most data mining algorithms require the setting of many input parameters. Two main dangers of working with parameter-laden algorithms are the following. First, incorrect settings ...
Eamonn J. Keogh, Stefano Lonardi, Chotirat (Ann) R...