Sciweavers

1274 search results - page 78 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
APCCM
2006
13 years 10 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
KDD
2008
ACM
121views Data Mining» more  KDD 2008»
14 years 9 months ago
Reconstructing chemical reaction networks: data mining meets system identification
We present an approach to reconstructing chemical reaction networks from time series measurements of the concentrations of the molecules involved. Our solution strategy combines t...
Yong Ju Cho, Naren Ramakrishnan, Yang Cao
ECCV
2008
Springer
14 years 10 months ago
Hierarchical Support Vector Random Fields: Joint Training to Combine Local and Global Features
Abstract. Recently, impressive results have been reported for the detection of objects in challenging real-world scenes. Interestingly however, the underlying models vary greatly e...
Paul Schnitzspan, Mario Fritz, Bernt Schiele
DAWAK
2003
Springer
14 years 2 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
BMCBI
2008
123views more  BMCBI 2008»
13 years 9 months ago
Functional module detection by functional flow pattern mining in protein interaction networks
eraction networks. In this abstract, we extend this approach by mining functional flow patterns for the purpose of detecting small-sized modules for specific functions. Methods Our...
Young-Rae Cho, Lei Shi, Aidong Zhang