Sciweavers

2032 search results - page 4 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 2 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
14 years 1 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 8 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...
APBC
2004
121views Bioinformatics» more  APBC 2004»
13 years 8 months ago
Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection
Using gene expression data for cancer detection is one of the famous research topics in bioinformatics. Theoretically, gene expression data is capable to detect all types of early...
Larry T. H. Yu, Fu-Lai Chung, Stephen Chi-fai Chan...
SACMAT
2003
ACM
14 years 20 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf