Sciweavers

ADMI
2009
Springer
14 years 3 months ago
Agent-Enriched Data Mining Using an Extendable Framework
An extendable and generic Agent Enriched Data Mining (AEDM) framework, EMADS (the Extendable Multi-Agent Data mining System) is described. The central feature of the framework is ...
Kamal Ali Albashiri, Frans Coenen
ADMA
2009
Springer
246views Data Mining» more  ADMA 2009»
14 years 3 months ago
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
Image spam is a new trend in the family of email spams. The new image spams employ a variety of image processing technologies to create random noises. In this paper, we propose a s...
Yan Gao, Ming Yang, Alok N. Choudhary
ADMA
2009
Springer
186views Data Mining» more  ADMA 2009»
14 years 3 months ago
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently
Mining frequent sequential patterns from sequence databases has been a central research topic in data mining and various efficient mining sequential patterns algorithms have been p...
Yongxin Tong, Zhao Li, Dan Yu, Shilong Ma, Zhiyuan...
ADMA
2009
Springer
142views Data Mining» more  ADMA 2009»
14 years 3 months ago
Crawling Deep Web Using a New Set Covering Algorithm
Abstract. Crawling the deep web often requires the selection of an appropriate set of queries so that they can cover most of the documents in the data source with low cost. This ca...
Yan Wang, Jianguo Lu, Jessica Chen
ADMA
2009
Springer
212views Data Mining» more  ADMA 2009»
14 years 3 months ago
Automating Gene Expression Annotation for Mouse Embryo
It is of high biomedical interest to identify gene interactions and networks that are associated with developmental and physiological functions in the mouse embryo. There are now v...
Liangxiu Han, Jano I. van Hemert, Richard A. Baldo...
ADMA
2009
Springer
145views Data Mining» more  ADMA 2009»
14 years 3 months ago
A Framework for Multi-Objective Clustering and Its Application to Co-Location Mining
The goal of multi-objective clustering (MOC) is to decompose a dataset into similar groups maximizing multiple objectives in parallel. In this paper, we provide a methodology, arch...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Ricar...
IEEEIAS
2009
IEEE
14 years 3 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ICSM
2009
IEEE
14 years 3 months ago
Predicting change impact from logical models
To improve the ability of predicting the impact scope of a given change, we present two approaches applicable to the maintenance of object-oriented software systems. Our first ap...
Sunny Wong, Yuanfang Cai