Sciweavers

719 search results - page 106 / 144
» Data Mining Application in Higher Learning Institutions
Sort
View
ICIAP
2005
ACM
14 years 8 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
ECAI
2004
Springer
14 years 1 months ago
Exploiting Association and Correlation Rules - Parameters for Improving the K2 Algorithm
A Bayesian network is an appropriate tool to deal with the uncertainty that is typical of real-life applications. Bayesian network arcs represent statistical dependence between dif...
Evelina Lamma, Fabrizio Riguzzi, Sergio Storari
ECML
2005
Springer
14 years 1 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
14 years 8 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider
SADM
2010
194views more  SADM 2010»
13 years 6 months ago
Seriation and matrix reordering methods: An historical overview
: Seriation is an exploratory combinatorial data analysis technique to reorder objects into a sequence along a one-dimensional continuum so that it best reveals regularity and patt...
Innar Liiv