Sciweavers

41 search results - page 3 / 9
» Cleaning disguised missing data: a heuristic approach
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 1 months ago
Efficient Heuristics for Discriminative Structure Learning of Bayesian Network Classifiers
We introduce a simple order-based greedy heuristic for learning discriminative structure within generative Bayesian network classifiers. We propose two methods for establishing an...
Franz Pernkopf, Jeff A. Bilmes
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 1 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
13 years 11 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
ACSAC
2010
IEEE
13 years 4 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
13 years 7 months ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee