Sciweavers

7 search results - page 2 / 2
» Bayesian Predictive Profiles With Applications to Retail Tra...
Sort
View
ACSAC
2006
IEEE
13 years 11 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ESANN
2004
13 years 6 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk