Sciweavers

140 search results - page 18 / 28
» Applications of Data Mining in Constraint-based Intelligent ...
Sort
View
88
Voted
KDD
2005
ACM
139views Data Mining» more  KDD 2005»
15 years 4 months ago
Learning to predict train wheel failures
This paper describes a successful but challenging application of data mining in the railway industry. The objective is to optimize maintenance and operation of trains through prog...
Chunsheng Yang, Sylvain Létourneau
FLAIRS
2004
15 years 13 days ago
Structure Discovery from Sequential Data
In this paper we describe I-Subdue, an extension to the Subdue graph-based data mining system. I-Subdue operates over sequentially received relational data to incrementally discov...
Jeffrey Coble, Diane J. Cook, Lawrence B. Holder, ...
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
15 years 11 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider
83
Voted
ISMIS
2005
Springer
15 years 4 months ago
Towards Ad-Hoc Rule Semantics for Gene Expression Data
The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional (or multivalued) dependencies in databases. ...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 11 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof