Sciweavers

Share
CIDM
2007
IEEE
8 years 8 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
CIDM
2007
IEEE
8 years 8 months ago
SSM : A Frequent Sequential Data Stream Patterns Miner
Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering c...
C. I. Ezeife, Mostafa Monwar
CIDM
2007
IEEE
9 years 7 days ago
Designing a Fuzzy Rule Based System to Estimate Depth of Anesthesia
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
CIDM
2007
IEEE
9 years 7 days ago
Mining the Students' Learning Interest in Browsing Web-Streaming Lectures
Web-Streaming lectures overcome the space and time barriers between learning and teaching, but bring higher requirements on the learning feedback of students when they browse lectu...
Long Wang 0002, Christoph Meinel
CIDM
2007
IEEE
9 years 7 days ago
Identifying Anatomical Phrases in Clinical Reports by Shallow Semantic Parsing Methods
Natural Language Processing (NLP) is being applied for several information extraction tasks in the biomedical domain. The unique nature of clinical information requires the need fo...
Vijayaraghavan Bashyam, Ricky K. Taira
CIDM
2007
IEEE
9 years 7 days ago
Efficient Kernel-based Learning for Trees
Kernel methods are effective approaches to the modeling of structured objects in learning algorithms. Their major drawback is the typically high computational complexity of kernel ...
Fabio Aiolli, Giovanni Da San Martino, Alessandro ...
CIDM
2007
IEEE
9 years 7 days ago
An Efficient Distance Calculation Method for Uncertain Objects
Recently the academic communities have paid more attention to the queries and mining on uncertain data. In the tasks such as clustering or nearest-neighbor queries, expected distan...
Lurong Xiao, Edward Hung
CIDM
2007
IEEE
9 years 2 months ago
Reactive Query Policies: A Formalism for Planning with Volatile External Information
— To generate plans for collecting data for data mining, an important problem is information volatility during planning: the information needed by the planning system may change ...
Tsz-Chiu Au, Dana S. Nau
books