Sciweavers

2212 search results - page 417 / 443
» User-Based Active Learning
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 9 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
WISEC
2010
ACM
14 years 3 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
TEI
2010
ACM
160views Hardware» more  TEI 2010»
14 years 3 months ago
Think globally, build locally: a technological platform for low-cost, open-source, locally-assembled programmable bricks for edu
“Programmable bricks” are microcontroller-based devices that can be used in various educational projects, such as robotic prototypes, environmental sensing, and interactive ar...
Arnan Sipitakiat, Paulo Blikstein
CANDC
2009
ACM
14 years 3 months ago
Exploring illuminative systems in informal networks of adults
Whenever we feel those ‘higher’ and hard to define sensations like synchronicity, love, wholeness, and appreciation is this a pattern or illuminative system that is part of a ...
Amy K. Scatliff