Sciweavers

23 search results - page 4 / 5
» Attribute Relevance in Multiclass Data Sets Using the Naive ...
Sort
View
KDD
1994
ACM
98views Data Mining» more  KDD 1994»
13 years 10 months ago
Rule Induction for Semantic Query Optimization
Semantic query optimization can dramatically speed up database query answering by knowledge intensive reformulation. But the problem of how to learn required semantic rules has no...
Chun-Nan Hsu, Craig A. Knoblock
KDD
2004
ACM
148views Data Mining» more  KDD 2004»
14 years 6 months ago
Spying Out Accurate User Preferences for Search Engine Adaptation
Abstract. Most existing search engines employ static ranking algorithms that do not adapt to the specific needs of users. Recently, some researchers have studied the use of clickth...
Lin Deng, Wilfred Ng, Xiaoyong Chai, Dik Lun Lee
ISMB
1993
13 years 7 months ago
Knowledge-Based Generation of Machine-Learning Experiments: Learning with DNA Crystallography Data
Thoughit has been possible in the past to learn to predict DNAhydration patterns from crystallographic data, there is ambiguity in the choice of training data (both in terms of th...
Dawn M. Cohen, Casimir A. Kulikowski, Helen Berman
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 10 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
JMLR
2006
132views more  JMLR 2006»
13 years 6 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof