Sciweavers

100 search results - page 14 / 20
» Mining specifications of malicious behavior
Sort
View
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 8 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
KDD
2004
ACM
106views Data Mining» more  KDD 2004»
14 years 8 months ago
Early detection of insider trading in option markets
"Inside information" comes in many forms: knowledge of a corporate takeover, a terrorist attack, unexpectedly poor earnings, the FDA's acceptance of a new drug, etc...
Steve Donoho
BMCBI
2008
142views more  BMCBI 2008»
13 years 7 months ago
Microarray data mining: A novel optimization-based approach to uncover biologically coherent structures
Background: DNA microarray technology allows for the measurement of genome-wide expression patterns. Within the resultant mass of data lies the problem of analyzing and presenting...
Meng Piao Tan, Erin N. Smith, James R. Broach, Chr...
EDM
2009
114views Data Mining» more  EDM 2009»
13 years 5 months ago
Reducing the Knowledge Tracing Space
In Cognitive Tutors, student skill is represented by estimates of student knowledge on various knowledge components. The estimate for each knowledge component is based on a four-pa...
Steven Ritter, Thomas K. Harris, Tristan Nixon, Da...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
14 years 8 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...