Sciweavers

345 search results - page 47 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
KDD
2008
ACM
165views Data Mining» more  KDD 2008»
14 years 8 months ago
Colibri: fast mining of large static and dynamic graphs
Low-rank approximations of the adjacency matrix of a graph are essential in finding patterns (such as communities) and detecting anomalies. Additionally, it is desirable to track ...
Hanghang Tong, Spiros Papadimitriou, Jimeng Sun, P...
JIPS
2010
195views more  JIPS 2010»
13 years 2 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
ICDE
2010
IEEE
199views Database» more  ICDE 2010»
14 years 2 months ago
Mining mutation chains in biological sequences
— The increasing infectious disease outbreaks has led to a need for new research to better understand the disease’s origins, epidemiological features and pathogenicity caused b...
Chang Sheng, Wynne Hsu, Mong-Li Lee, Joo Chuan Ton...
PCM
2004
Springer
91views Multimedia» more  PCM 2004»
14 years 1 months ago
A Rapid Scheme for Slow-Motion Replay Segment Detection
Abstract. Efficient data mining for digital video has become increasingly important in recent years. In this paper, we present a new scheme for automatic detection of slow-motion r...
Wei-Hong Chuang, Dun-Yu Hsiao, Soo-Chang Pei, Home...
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...