Sciweavers

345 search results - page 11 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
ESWA
2006
161views more  ESWA 2006»
13 years 7 months ago
Automated trend analysis of proteomics data using an intelligent data mining architecture
Proteomics is a field dedicated to the analysis and identification of proteins within an organism. Within proteomics, two-dimensional electrophoresis (2-DE) is currently unrivalle...
James Malone, Kenneth McGarry, Chris Bowerman
DMIN
2007
110views Data Mining» more  DMIN 2007»
13 years 9 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
EDM
2009
175views Data Mining» more  EDM 2009»
13 years 5 months ago
Detecting Symptoms of Low Performance Using Production Rules
E-Learning systems offer students innovative and attractive ways of learning through augmentation or substitution of traditional lectures and exercises with online learning materia...
Javier Bravo Agapito, Alvaro Ortigosa
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 9 months ago
A Spamicity Approach to Web Spam Detection
Web spam, which refers to any deliberate actions bringing to selected web pages an unjustifiable favorable relevance or importance, is one of the major obstacles for high quality ...
Bin Zhou 0002, Jian Pei, ZhaoHui Tang
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 8 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier