Sciweavers

1768 search results - page 271 / 354
» Mining Very Large Databases
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICPP
2006
IEEE
14 years 4 months ago
Adaptively Routing P2P Queries Using Association Analysis
Unstructured peer-to-peer networks have become a very popular method for content distribution in the past few years. By not enforcing strict rules on the network’s topology or c...
Brian D. Connelly, Christopher W. Bowron, Li Xiao,...
JCDL
2006
ACM
172views Education» more  JCDL 2006»
14 years 4 months ago
A comprehensive comparison study of document clustering for a biomedical digital library MEDLINE
Document clustering has been used for better document retrieval, document browsing, and text mining in digital library. In this paper, we perform a comprehensive comparison study ...
Illhoi Yoo, Xiaohua Hu
GPCE
2005
Springer
14 years 3 months ago
Object-Oriented Reengineering Patterns - An Overview
Successful software systems must be prepared to evolve or they will die. Although object-oriented software systems are built to last, over time they degrade as much as any legacy s...
Oscar Nierstrasz, Stéphane Ducasse, Serge D...
TOPNOC
2008
13 years 10 months ago
Assessing State Spaces Using Petri-Net Synthesis and Attribute-Based Visualization
State spaces are commonly used representations of system behavior. A state space may be derived from a model of system behavior but can also be obtained through process mining. For...
H. M. W. (Eric) Verbeek, A. Johannes Pretorius, Wi...