Sciweavers

90 search results - page 15 / 18
» Capturing the spatio-temporal behavior of real traffic data
Sort
View
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
15 years 10 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
73
Voted
PKDD
2009
Springer
107views Data Mining» more  PKDD 2009»
15 years 4 months ago
Neural Networks for State Evaluation in General Game Playing
Unlike traditional game playing, General Game Playing is concerned with agents capable of playing classes of games. Given the rules of an unknown game, the agent is supposed to pla...
Daniel Michulke, Michael Thielscher
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 3 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
89
Voted
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
15 years 10 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo