Sciweavers

2705 search results - page 68 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
PKDD
2010
Springer
152views Data Mining» more  PKDD 2010»
13 years 7 months ago
CET: A Tool for Creative Exploration of Graphs
We present a tool for interactive exploration of graphs that integrates advanced graph mining methods in an interactive visualization framework. The tool enables efficient explorat...
Stefan Haun, Andreas Nürnberger, Tobias K&oum...
ACSAC
2006
IEEE
14 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
WSOM
2009
Springer
14 years 3 months ago
Analysis of Parliamentary Election Results and Socio-Economic Situation Using Self-Organizing Map
The complex phenomena of political science are typically studied using qualitative approach, potentially supported by hypothesisdriven statistical analysis of some numerical data. ...
Pyry Niemelä, Timo Honkela
DATAMINE
2007
103views more  DATAMINE 2007»
13 years 9 months ago
Relational peculiarity-oriented mining
Peculiarity rules are a new type of useful knowledge that can be discovered by searching the relevance among peculiar data. A main task in mining such knowledge is peculiarity iden...
Muneaki Ohshima, Ning Zhong, Yiyu Yao, Chunnian Li...
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 1 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...