Sciweavers

345 search results - page 37 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 14 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
LWA
2007
13 years 9 months ago
Incremental Mining for Facility Management
Modern buildings are equipped with high-tech systems that take care of several fundamental aspects, e.g., air-conditioning, heating and water supply. The requirements posed on fac...
Katja Hose, Marcel Karnstedt, Daniel Klan, Kai-Uwe...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 4 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 8 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng