Sciweavers

KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 9 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 9 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
KDD
1998
ACM
442views Data Mining» more  KDD 1998»
13 years 9 months ago
BAYDA: Software for Bayesian Classification and Feature Selection
BAYDA is a software package for flexible data analysis in predictive data mining tasks. The mathematical model underlying the program is based on a simple Bayesian network, the Na...
Petri Kontkanen, Petri Myllymäki, Tomi Siland...
KDD
1998
ACM
113views Data Mining» more  KDD 1998»
13 years 9 months ago
Targeting Business Users with Decision Table Classifiers
Business users and analysts commonly use spreadsheets and 2D plots to analyze and understand their data. On-line Analytical Processing (OLAP) provides these users with added flexi...
Ron Kohavi, Dan Sommerfield
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
13 years 9 months ago
Active Templates: Comprehensive Support for the Knowledge Discovery Process
The goal of Active Template research is to create a single, unified environment that a data analyst can use to carry out a knowledge discovery project, and to deliver the resultin...
Randy Kerber, Hal Beck, Tej Anand, Bill Smart
KDD
1998
ACM
102views Data Mining» more  KDD 1998»
13 years 9 months ago
Defining the Goals to Optimise Data Mining Performance
In many data mining problems the definition of what structures in the database are to be regarded as interesting or valuable is given only loosely. Typically this is regarded as a...
Mark G. Kelly, David J. Hand, Niall M. Adams
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
13 years 9 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
KDD
1998
ACM
166views Data Mining» more  KDD 1998»
13 years 9 months ago
Comparing Massive High-Dimensional Data Sets
Theodore Johnson, Tamraparni Dasu
KDD
1998
ACM
99views Data Mining» more  KDD 1998»
13 years 9 months ago
Learning to Predict the Duration of an Automobile Trip
In this paper, weexplore the use of machinelearning and data mining to improvethe prediction of travel times in an automobile. Weconsider two formulations of this problem, one tha...
Simon Handley, Pat Langley, Folke A. Rauscher
KDD
1998
ACM
190views Data Mining» more  KDD 1998»
13 years 9 months ago
Mining Segment-Wise Periodic Patterns in Time-Related Databases
Periodicity search, that is, searchfor cyclicity in time-related databases, is an interesting data mining problem. Mostprevious studies have been on finding full-cycle periodicity...
Jiawei Han, Wan Gong, Yiwen Yin