Sciweavers

1552 search results - page 52 / 311
» Mining for Patterns in Contradictory Data
Sort
View
113
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
171
Voted
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 6 months ago
Harnessing the wisdom of the crowds for accurate web page clipping
Clipping Web pages, namely extracting the informative clips (areas) from Web pages, has many applications, such as Web printing and e-reading on small handheld devices. Although m...
Lei Zhang, Linpeng Tang, Ping Luo, Enhong Chen, Li...
155
Voted
WEBI
2009
Springer
15 years 10 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
152
Voted
KDD
2012
ACM
185views Data Mining» more  KDD 2012»
13 years 6 months ago
A framework for summarizing and analyzing twitter feeds
The firehose of data generated by users on social networking and microblogging sites such as Facebook and Twitter is enormous. Real-time analytics on such data is challenging wit...
Xintian Yang, Amol Ghoting, Yiye Ruan, Srinivasan ...
125
Voted
IDA
2005
Springer
15 years 9 months ago
From Local Pattern Mining to Relevant Bi-cluster Characterization
Clustering or bi-clustering techniques have been proved quite useful in many application domains. A weakness of these techniques remains the poor support for grouping characterizat...
Ruggero G. Pensa, Jean-François Boulicaut