Sciweavers

289 search results - page 46 / 58
» On exploiting the power of time in data mining
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
PKDD
2010
Springer
212views Data Mining» more  PKDD 2010»
13 years 6 months ago
Cross Validation Framework to Choose amongst Models and Datasets for Transfer Learning
Abstract. One solution to the lack of label problem is to exploit transfer learning, whereby one acquires knowledge from source-domains to improve the learning performance in the t...
ErHeng Zhong, Wei Fan, Qiang Yang, Olivier Versche...
VLDB
2004
ACM
163views Database» more  VLDB 2004»
14 years 28 days ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...
MM
2004
ACM
145views Multimedia» more  MM 2004»
14 years 1 months ago
Segmentation and recognition of multi-attribute motion sequences
In this work, we focus on fast and efficient recognition of motions in multi-attribute continuous motion sequences. 3D motion capture data, animation motion data, and sensor data ...
Chuanjun Li, Peng Zhai, Si-Qing Zheng, Balakrishna...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...