Sciweavers

72 search results - page 11 / 15
» kdd 1998
Sort
View
KDD
1998
ACM
160views Data Mining» more  KDD 1998»
13 years 11 months ago
Algorithms for Characterization and Trend Detection in Spatial Databases
1 The number and the size of spatial databases, e.g. for geomarketing, traffic control or environmental studies, are rapidly growing which results in an increasing need for spatial...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
13 years 11 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
KDD
1998
ACM
94views Data Mining» more  KDD 1998»
13 years 11 months ago
Independence Diagrams: A Technique for Visual Data Mining
An important issue in data mining is the recognition of complex dependencies between attributes. Past techniques for identifying attribute dependence include correlation coefficie...
Stefan Berchtold, H. V. Jagadish, Kenneth A. Ross
KDD
1998
ACM
123views Data Mining» more  KDD 1998»
13 years 11 months ago
Scaling Clustering Algorithms to Large Databases
Practical clustering algorithms require multiple data scans to achieve convergence. For large databases, these scans become prohibitively expensive. We present a scalable clusteri...
Paul S. Bradley, Usama M. Fayyad, Cory Reina
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 11 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok