Sciweavers

25 search results - page 4 / 5
» ausdm 2008
Sort
View
AUSDM
2008
Springer
271views Data Mining» more  AUSDM 2008»
13 years 7 months ago
Classification of Brain-Computer Interface Data
In this paper we investigate the classification of mental tasks based on electroencephalographic (EEG) data for Brain Computer Interfaces (BCI) in two scenarios: off line and on-l...
Omar AlZoubi, Irena Koprinska, Rafael A. Calvo
AUSDM
2008
Springer
235views Data Mining» more  AUSDM 2008»
13 years 7 months ago
ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns
Share-frequent pattern mining discovers more useful and realistic knowledge from database compared to the traditional frequent pattern mining by considering the non-binary frequen...
Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer,...
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 7 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 7 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 7 months ago
Evaluation of Malware clustering based on its dynamic behaviour
Malware detection is an important problem today. New malware appears every day and in order to be able to detect it, it is important to recognize families of existing malware. Dat...
Ibai Gurrutxaga, Olatz Arbelaitz, Jesús M. ...