Sciweavers

601 search results - page 86 / 121
» Maintaining Data Privacy in Association Rule Mining
Sort
View
GIS
2006
ACM
14 years 9 months ago
Mining frequent geographic patterns with knowledge constraints
The large amount of patterns generated by frequent pattern mining algorithms has been extensively addressed in the last few years. In geographic pattern mining, besides the large ...
Luis Otávio Alvares, Paulo Martins Engel, S...
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
13 years 7 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 26 days ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
IRI
2005
IEEE
14 years 2 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
IJSI
2008
122views more  IJSI 2008»
13 years 8 months ago
Mining Gene Expression Data using Domain Knowledge
Biology is now an information-intensive science and various research areas, like molecular biology, evolutionary biology or environmental biology, heavily depend on the availabilit...
Nicolas Pasquier, Claude Pasquier, Laurent Brisson...