Sciweavers

54 search results - page 10 / 11
» Fuzzy Decision Tree Induction Approach for Mining Fuzzy Asso...
Sort
View
ICDE
2008
IEEE
153views Database» more  ICDE 2008»
14 years 8 months ago
Mining Views: Database Views for Data Mining
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining vi...
Élisa Fromont, Adriana Prado, Bart Goethals...
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 24 days ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 8 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
DMKD
2000
ACM
165views Data Mining» more  DMKD 2000»
13 years 11 months ago
On Mining Web Access Logs
The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine ...
Anupam Joshi, Raghu Krishnapuram
FSKD
2006
Springer
124views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
An Effective Combination of Multiple Classifiers for Toxicity Prediction
This paper presents an investigation into the combination of different classifiers for toxicity prediction. These classification methods involved in generating classifiers for comb...
Gongde Guo, Daniel Neagu, Xuming Huang, Yaxin Bi