Sciweavers

241 search results - page 3 / 49
» Identifying Character Non-Independence in Phylogenetic Data ...
Sort
View
IRI
2005
IEEE
13 years 11 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
ICSM
2009
IEEE
13 years 3 months ago
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data
Mailing list repositories contain valuable information about the history of a project. Research is starting to mine this information to support developers and maintainers of longl...
Nicolas Bettenburg, Emad Shihab, Ahmed E. Hassan
SDM
2009
SIAM
205views Data Mining» more  SDM 2009»
14 years 2 months ago
Identifying Information-Rich Subspace Trends in High-Dimensional Data.
Identifying information-rich subsets in high-dimensional spaces and representing them as order revealing patterns (or trends) is an important and challenging research problem in m...
Chandan K. Reddy, Snehal Pokharkar
IJCNN
2006
IEEE
13 years 11 months ago
Reconstruction of Gene Regulatory Networks from Temporal Microarray Data Using Pattern Recognition Techniques
- Gene regulatory networks allow us to study and understand genes’ roles in biological processes. Among others, regulatory networks help to identify pathway initiator genes and t...
Azhar Salim, Faramarz Valafar
KDD
2001
ACM
181views Data Mining» more  KDD 2001»
14 years 6 months ago
Identifying non-actionable association rules
Building predictive models and finding useful rules are two important tasks of data mining. While building predictive models has been well studied, finding useful rules for action...
Bing Liu, Wynne Hsu, Yiming Ma