Sciweavers

2259 search results - page 417 / 452
» Mining Actionable Patterns
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 8 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
JODS
2006
206views Data Mining» more  JODS 2006»
13 years 8 months ago
Emergent Semantics in Knowledge Sifter: An Evolutionary Search Agent Based on Semantic Web Services
This paper addresses the various facets of emergent semantics in content retrieval systems such as Knowledge Sifter, an architecture and system based on the use of specialized agen...
Larry Kerschberg, Hanjo Jeong, Wooju Kim
KAIS
2006
121views more  KAIS 2006»
13 years 8 months ago
Using discriminant analysis for multi-class classification: an experimental investigation
Abstract. Many supervised machine learning tasks can be cast as multi-class classification problems. Support vector machines (SVMs) excel at binary classification problems, but the...
Tao Li, Shenghuo Zhu, Mitsunori Ogihara
TKDE
2008
115views more  TKDE 2008»
13 years 8 months ago
Time-Aware Web Users' Clustering
Web users clustering is a crucial task for mining information related to users needs and preferences. Up to now, popular clustering approaches build clusters based on usage pattern...
Sophia G. Petridou, Vassiliki A. Koutsonikola, Ath...
TSE
2008
91views more  TSE 2008»
13 years 8 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra