Sciweavers

8614 search results - page 1489 / 1723
» Mining
Sort
View
120
Voted
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 10 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
125
Voted
ICCV
2007
IEEE
15 years 10 months ago
Contextual Distance for Data Perception
Structural perception of data plays a fundamental role in pattern analysis and machine learning. In this paper, we develop a new structural perception of data based on local conte...
Deli Zhao, Zhouchen Lin, Xiaoou Tang
132
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Non-Threshold based Event Detection for 3D Environment Monitoring in Sensor Networks
Event detection is a crucial task for wireless sensor network applications, especially environment monitoring. Existing approaches for event detection are mainly based on some pre...
Mo Li, Yunhao Liu, Lei Chen 0002
138
Voted
ICDE
2007
IEEE
179views Database» more  ICDE 2007»
15 years 10 months ago
A New ILP-based Concept Discovery Method for Business Intelligence
In this work, we propose a multi-relational concept discovery method for business intelligence applications. Multi-relational data mining finds interesting patterns that span ove...
Seda Daglar Toprak, Pinar Senkul, Yusuf Kavurucu, ...
149
Voted
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
15 years 10 months ago
Analyses and Fundamental ideas for a Relation Extraction Approach
Relation extraction is a difficult open research problem with important applications in several fields such as knowledge management, web mining, ontology building, intelligent sys...
Lobna Karoui, Marie-Aude Aufaure, Nacéra Be...
« Prev « First page 1489 / 1723 Last » Next »