Sciweavers

3070 search results - page 217 / 614
» Making pattern mining useful
Sort
View
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
14 years 6 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
KER
2006
107views more  KER 2006»
13 years 9 months ago
Partitioning strategies for distributed association rule mining
In this paper a number of alternative strategies for distributed/parallel association rule mining are investigated. The methods examined make use of a data structure, the T-tree, ...
Frans Coenen, Paul H. Leng
EURONGI
2008
Springer
13 years 11 months ago
Image Recognition Traffic Patterns for Wireless Multimedia Sensor Networks
The objective of this work is to identify some of the traffic characteristics of Wireless Multimedia Sensor Networks (WMSN). Applications such as video surveillance sensor networks...
Ruken Zilan, José M. Barceló-Ordinas...
ETRICS
2006
14 years 1 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
IJCAI
2003
13 years 11 months ago
Coherent Keyphrase Extraction via Web Mining
Keyphrases are useful for a variety of purposes, including summarizing, indexing, labeling, categorizing, clustering, highlighting, browsing, and searching. The task of automatic ...
Peter D. Turney