Sciweavers

1298 search results - page 181 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
TON
2008
102views more  TON 2008»
15 years 3 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
115
Voted
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
15 years 7 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu
MLDM
2009
Springer
15 years 10 months ago
Regional Pattern Discovery in Geo-referenced Datasets Using PCA
Existing data mining techniques mostly focus on finding global patterns and lack the ability to systematically discover regional patterns. Most relationships in spatial datasets ar...
Oner Ulvi Celepcikay, Christoph F. Eick, Carlos Or...
SAINT
2003
IEEE
15 years 8 months ago
Extracting Spatial Knowledge from the Web
The content of the world-wide web is pervaded by information of a geographical or spatial nature, particularly such location information as addresses, postal codes, and telephone ...
Yasuhiko Morimoto, Masaki Aono, Michael E. Houle, ...
155
Voted
ICDM
2006
IEEE
193views Data Mining» more  ICDM 2006»
15 years 9 months ago
Feature Subset Selection on Multivariate Time Series with Extremely Large Spatial Features
Several spatio-temporal data collected in many applications, such as fMRI data in medical applications, can be represented as a Multivariate Time Series (MTS) matrix with m rows (...
Hyunjin Yoon, Cyrus Shahabi