Sciweavers

Share
KDD
2003
ACM
145views Data Mining» more  KDD 2003»
9 years 10 months ago
Carpenter: finding closed patterns in long biological datasets
The growth of bioinformatics has resulted in datasets with new characteristics. These datasets typically contain a large number of columns and a small number of rows. For example,...
Feng Pan, Gao Cong, Anthony K. H. Tung, Jiong Yang...
KDD
2003
ACM
195views Data Mining» more  KDD 2003»
9 years 10 months ago
Visualizing changes in the structure of data for exploratory feature selection
Using visualization techniques to explore and understand high-dimensional data is an efficient way to combine human intelligence with the immense brute force computation power ava...
Elias Pampalk, Werner Goebl, Gerhard Widmer
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
9 years 10 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
9 years 10 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
KDD
2003
ACM
150views Data Mining» more  KDD 2003»
9 years 10 months ago
Learning relational probability trees
Classification trees are widely used in the machine learning and data mining communities for modeling propositional data. Recent work has extended this basic paradigm to probabili...
Jennifer Neville, David Jensen, Lisa Friedland, Mi...
KDD
2003
ACM
120views Data Mining» more  KDD 2003»
9 years 10 months ago
Distributed cooperative mining for information consortia
Satoshi Morinaga, Kenji Yamanishi, Jun-ichi Takeuc...
KDD
2003
ACM
109views Data Mining» more  KDD 2003»
9 years 10 months ago
Experimental design for solicitation campaigns
Data mining techniques are routinely used by fundraisers to select those prospects from a large pool of candidates who are most likely to make a financial contribution. These tech...
Uwe F. Mayer, Armand Sarkissian
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
9 years 10 months ago
Mining data records in Web pages
A large amount of information on the Web is contained in regularly structured objects, which we call data records. Such data records are important because they often present the e...
Bing Liu, Robert L. Grossman, Yanhong Zhai
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
9 years 10 months ago
Empirical comparisons of various voting methods in bagging
Finding effective methods for developing an ensemble of models has been an active research area of large-scale data mining in recent years. Models learned from data are often subj...
Kelvin T. Leung, Douglas Stott Parker Jr.
books