Sciweavers

1274 search results - page 94 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2005
ACM
119views Data Mining» more  KDD 2005»
15 years 9 months ago
LIPED: HMM-based life profiles for adaptive event detection
In this paper, the proposed LIPED (LIfe Profile based Event Detection) employs the concept of life profiles to predict the activeness of event for effective event detection. A gro...
Chien Chin Chen, Meng Chang Chen, Ming-Syan Chen
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 10 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
NAACL
2010
15 years 1 months ago
Using Mostly Native Data to Correct Errors in Learners' Writing
We present results from a range of experiments on article and preposition error correction for non-native speakers of English. We first compare a language model and errorspecific ...
Michael Gamon
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 4 months ago
Exploiting context analysis for combining multiple entity resolution systems
Entity Resolution (ER) is an important real world problem that has attracted significant research interest over the past few years. It deals with determining which object descript...
Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotr...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 4 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye