Sciweavers

164 search results - page 28 / 33
» Mining advertiser-specific user behavior using adfactors
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 7 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
ICWE
2010
Springer
13 years 6 months ago
Association-Rules-Based Recommender System for Personalization in Adaptive Web-Based Applications
Personalization systems based upon users' surfing behavior analysis imply three phases: data collection, pattern discovery and recommendation. Due to the dimension of log file...
Daniel Mican, Nicolae Tomai
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
IADIS
2004
13 years 9 months ago
Simplifying the Clickstream Retrieval Using Weblogger Tool
Data Webhouses are used to retain all the information related to web user's behavior within a web site, working as a shared repository of business data. The advent of e-busin...
João Silva, João Bernardino
JODS
2006
206views Data Mining» more  JODS 2006»
13 years 7 months ago
Emergent Semantics in Knowledge Sifter: An Evolutionary Search Agent Based on Semantic Web Services
This paper addresses the various facets of emergent semantics in content retrieval systems such as Knowledge Sifter, an architecture and system based on the use of specialized agen...
Larry Kerschberg, Hanjo Jeong, Wooju Kim