Sciweavers

352 search results - page 47 / 71
» Crime Data Mining: An Overview and Case Studies
Sort
View
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
VLDB
1999
ACM
142views Database» more  VLDB 1999»
14 years 7 days ago
Active Storage Hierarchy, Database Systems and Applications - Socratic Exegesis
stract This panel addresses a very important area that is often neglected or overlooked by database systems, database applications developers and data warehouse designers, namely s...
Felipe Cariño, William O'Connell, John Burg...
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
14 years 9 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
GIS
2008
ACM
14 years 9 months ago
Finding regional co-location patterns for sets of continuous variables in spatial datasets
This paper proposes a novel framework for mining regional colocation patterns with respect to sets of continuous variables in spatial datasets. The goal is to identify regions in ...
Christoph F. Eick, Jean-Philippe Nicot, Rachana Pa...
KDD
1999
ACM
199views Data Mining» more  KDD 1999»
14 years 7 days ago
The Application of AdaBoost for Distributed, Scalable and On-Line Learning
We propose to use AdaBoost to efficiently learn classifiers over very large and possibly distributed data sets that cannot fit into main memory, as well as on-line learning wher...
Wei Fan, Salvatore J. Stolfo, Junxin Zhang