Sciweavers

796 search results - page 14 / 160
» Effective Use of the KDD Process and Data Mining for Compute...
Sort
View
FGCS
2007
160views more  FGCS 2007»
13 years 8 months ago
Distributed data mining in grid computing environments
The computing-intensive data mining for inherently Internet-wide distributed data, referred to as Distributed Data Mining (DDM), calls for the support of a powerful Grid with an e...
Ping Luo, Kevin Lü, Zhongzhi Shi, Qing He
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 9 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
KDD
1995
ACM
108views Data Mining» more  KDD 1995»
14 years 14 days ago
A Statistical Perspective On Knowledge Discovery In Databases
The quest to nd models usefully characterizing data is a process central to the scienti c method, and has been carried out on many fronts. Researchers from an expanding number of ...
John F. Elder IV, Daryl Pregibon
CIS
2007
Springer
14 years 3 months ago
Mining with Noise Knowledge: Error Aware Data Mining
—Real-world data mining deals with noisy information sources where data collection inaccuracy, device limitations, data transmission and discretization errors, or man-made pertur...
Xindong Wu
KDD
2009
ACM
183views Data Mining» more  KDD 2009»
14 years 3 months ago
Financial incentives and the "performance of crowds"
The relationship between financial incentives and performance, long of interest to social scientists, has gained new relevance with the advent of web-based “crowd-sourcing” mo...
Winter A. Mason, Duncan J. Watts