Sciweavers

138 search results - page 15 / 28
» Relational Frequent Patterns Mining for Novelty Detection fr...
Sort
View
FEGC
2010
161views Biometrics» more  FEGC 2010»
13 years 9 months ago
Detecting anomalies in data streams using statecharts
The environment around us is progressively equipped with various sensors, producing data continuously. The applications using these data face many challenges, such as data stream i...
Vasile-Marian Scuturici, Dan-Mircea Suciu, Romain ...
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 1 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
KDD
1999
ACM
185views Data Mining» more  KDD 1999»
13 years 12 months ago
User-Driven Navigation Pattern Discovery from Internet Data
Managers of electronic commerce sites need to learn as much as possible about their customers and those browsing their virtual premises, in order to maximise the return on marketin...
Matthias Baumgarten, Alex G. Büchner, Sarabjo...
SIGMOD
2004
ACM
162views Database» more  SIGMOD 2004»
14 years 7 months ago
Graph Indexing: A Frequent Structure-based Approach
Graph has become increasingly important in modelling complicated structures and schemaless data such as proteins, chemical compounds, and XML documents. Given a graph query, it is...
Xifeng Yan, Philip S. Yu, Jiawei Han
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham