Sciweavers

1274 search results - page 85 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICMCS
2009
IEEE
140views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Resource-adaptive multimedia analysis on stream mining systems
Large-scale multimedia semantic concept detection requires realtime identification of a set of concepts in streaming video or large image datasets. The potentially high data volum...
Deepak S. Turaga, Rong Yan, Olivier Verscheure, Br...
IJWET
2008
98views more  IJWET 2008»
15 years 4 months ago
Warehousing complex data from the web
: Data warehousing and Online Analytical Processing (OLAP) technologies are now moving onto handling complex data that mostly originate from the web. However, integrating such data...
Omar Boussaid, Jérôme Darmont, Fadila...
125
Voted
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 10 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
EMNLP
2010
15 years 1 months ago
The Necessity of Combining Adaptation Methods
Problems stemming from domain adaptation continue to plague the statistical natural language processing community. There has been continuing work trying to find general purpose al...
Ming-Wei Chang, Michael Connor, Dan Roth
140
Voted
ETRICS
2006
15 years 7 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...