Sciweavers

381 search results - page 59 / 77
» Pattern Directed Mining of Sequence Data
Sort
View
SAC
2004
ACM
14 years 2 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
14 years 3 months ago
Temporal Analysis of Semantic Graphs Using ASALSAN
ASALSAN is a new algorithm for computing three-way DEDICOM, which is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or th...
Brett W. Bader, Richard A. Harshman, Tamara G. Kol...
PKDD
2010
Springer
313views Data Mining» more  PKDD 2010»
13 years 7 months ago
Topic Modeling for Personalized Recommendation of Volatile Items
One of the major strengths of probabilistic topic modeling is the ability to reveal hidden relations via the analysis of co-occurrence patterns on dyadic observations, such as docu...
Maks Ovsjanikov, Ye Chen
BMCBI
2007
87views more  BMCBI 2007»
13 years 8 months ago
A manually curated database of tetrapod mitochondrially encoded tRNA sequences and secondary structures
Background: Mitochondrial tRNAs have been the subject of study for structural biologists interested in their secondary structure characteristics, evolutionary biologists have rese...
Konstantin Yu Popadin, Leila A. Mamirova, Fyodor A...
SACMAT
2009
ACM
14 years 3 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...