Sciweavers

1298 search results - page 156 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
146
Voted
CSDA
2008
128views more  CSDA 2008»
15 years 3 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
ACSAC
2008
IEEE
15 years 10 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
132
Voted
ICCV
2007
IEEE
16 years 5 months ago
Classification of Weakly-Labeled Data with Partial Equivalence Relations
In many vision problems, instead of having fully labeled training data, it is easier to obtain the input in small groups, where the data in each group is constrained to be from th...
Sanjiv Kumar, Henry A. Rowley
141
Voted
SDM
2007
SIAM
118views Data Mining» more  SDM 2007»
15 years 5 months ago
On Privacy-Preservation of Text and Sparse Binary Data with Sketches
In recent years, privacy preserving data mining has become very important because of the proliferation of large amounts of data on the internet. Many data sets are inherently high...
Charu C. Aggarwal, Philip S. Yu
161
Voted
BMCBI
2010
115views more  BMCBI 2010»
15 years 3 months ago
Importance of replication in analyzing time-series gene expression data: Corticosteroid dynamics and circadian patterns in rat l
Background: Microarray technology is a powerful and widely accepted experimental technique in molecular biology that allows studying genome wide transcriptional responses. However...
Tung T. Nguyen, Richard R. Almon, Debra C. DuBois,...