Sciweavers

7163 search results - page 1352 / 1433
» Privacy-Preserving Data Mining
Sort
View
RSFDGRC
2005
Springer
190views Data Mining» more  RSFDGRC 2005»
14 years 4 months ago
Finding Rough Set Reducts with SAT
Abstract. Feature selection refers to the problem of selecting those input features that are most predictive of a given outcome; a problem encountered in many areas such as machine...
Richard Jensen, Qiang Shen, Andrew Tuson
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 4 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
WINE
2005
Springer
143views Economy» more  WINE 2005»
14 years 4 months ago
An Analysis of Search Engine Switching Behavior Using Click Streams
In this paper, we propose a simple framework to characterize the switching behavior between search engines based on click streams. We segment users into a number of categories bas...
Yun-Fang Juan, Chi-Chao Chang
ECML
2005
Springer
14 years 4 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
DOLAP
2004
ACM
14 years 4 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...
« Prev « First page 1352 / 1433 Last » Next »