Sciweavers

697 search results - page 92 / 140
» Mining negative association rules
Sort
View
IPCCC
2007
IEEE
15 years 11 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
ASE
2011
14 years 8 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
EDM
2010
152views Data Mining» more  EDM 2010»
15 years 6 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim
KDD
2002
ACM
173views Data Mining» more  KDD 2002»
16 years 5 months ago
LumberJack: Intelligent Discovery and Analysis of Web User Traffic Composition
Web Usage Mining enables new understanding of user goals on the Web. This understanding has broad applications, and traditional mining techniques such as association rules have bee...
Ed Huai-hsin Chi, Adam Rosien, Jeffrey Heer
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
15 years 10 months ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...