Sciweavers

345 search results - page 34 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
KDD
1999
ACM
185views Data Mining» more  KDD 1999»
13 years 12 months ago
User-Driven Navigation Pattern Discovery from Internet Data
Managers of electronic commerce sites need to learn as much as possible about their customers and those browsing their virtual premises, in order to maximise the return on marketin...
Matthias Baumgarten, Alex G. Büchner, Sarabjo...
KDD
2002
ACM
186views Data Mining» more  KDD 2002»
14 years 8 months ago
Topic-conditioned novelty detection
Automated detection of the first document reporting each new event in temporally-sequenced streams of documents is an open challenge. In this paper we propose a new approach which...
Yiming Yang, Jian Zhang, Jaime G. Carbonell, Chun ...
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
14 years 1 months ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
PKDD
2005
Springer
101views Data Mining» more  PKDD 2005»
14 years 1 months ago
A Random Method for Quantifying Changing Distributions in Data Streams
In applications such as fraud and intrusion detection, it is of great interest to measure the evolving trends in the data. We consider the problem of quantifying changes between tw...
Haixun Wang, Jian Pei