Sciweavers

1294 search results - page 29 / 259
» Privacy and Data Mining: New Developments and Challenges
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICDE
2007
IEEE
96views Database» more  ICDE 2007»
13 years 11 months ago
Mining Software Data
Data mining techniques and machine learning methods are commonly used in several disciplines. It is possible that they could also provide a basis for quality assessment of softwar...
Burak Turhan, F. Onur Kutlubay
DOLAP
2004
ACM
14 years 1 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...
DAWAK
2011
Springer
12 years 7 months ago
OLAP Formulations for Supporting Complex Spatial Objects in Data Warehouses
In recent years, there has been a large increase in the amount of spatial data obtained from remote sensing, GPS receivers, communication terminals and other domains. Data warehous...
Ganesh Viswanathan, Markus Schneider
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
13 years 12 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...