Sciweavers

345 search results - page 45 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 8 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
13 years 11 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 2 months ago
An exploration of climate data using complex networks
To discover patterns in historical data, climate scientists have applied various clustering methods with the goal of identifying regions that share some common climatological beha...
Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. ...
WWW
2004
ACM
14 years 8 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 2 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...