Sciweavers

100 search results - page 11 / 20
» Mining specifications of malicious behavior
Sort
View
DASFAA
2008
IEEE
137views Database» more  DASFAA 2008»
13 years 9 months ago
Efficient Mining of Recurrent Rules from a Sequence Database
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
David Lo, Siau-Cheng Khoo, Chao Liu 0001
DMIN
2007
110views Data Mining» more  DMIN 2007»
13 years 9 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 9 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...
ICMLC
2010
Springer
13 years 5 months ago
Data mining model in analyzing portuguese studies as the second language acquisition
: Portuguese is specifically a difficult language with luxuriant tenses, and second language acquisition (SLA) is regarded as highly variable. Many (Chinese) students who learn Por...
Sam Chao, Fai Wong, CustoDio Cavaco Martins
AUSDM
2008
Springer
224views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Customer Event Rate Estimation Using Particle Filters
Estimating the rate at which events happen has been studied under various guises and in different settings. We are interested in the specific case of consumerinitiated events or t...
Harsha Honnappa