Sciweavers

1400 search results - page 240 / 280
» Post-Analysis of Learned Rules
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 5 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
16 years 5 months ago
Mining from open answers in questionnaire data
Surveys are an important part of marketing and customer relationship management, and open answers (i.e., answers to open questions) in particular may contain valuable information ...
Hang Li, Kenji Yamanishi
157
Voted
PODS
2003
ACM
156views Database» more  PODS 2003»
16 years 4 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
154
Voted
SOSP
2007
ACM
16 years 1 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
SDM
2008
SIAM
130views Data Mining» more  SDM 2008»
15 years 6 months ago
Mining Sequence Classifiers for Early Prediction
Supervised learning on sequence data, also known as sequence classification, has been well recognized as an important data mining task with many significant applications. Since te...
Zhengzheng Xing, Jian Pei, Guozhu Dong, Philip S. ...