Sciweavers

1274 search results - page 193 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICDM
2006
IEEE
214views Data Mining» more  ICDM 2006»
15 years 3 months ago
Forecasting Skewed Biased Stochastic Ozone Days: Analyses and Solutions
Much work on skewed, stochastic, high dimensional, and biased datasets usually implicitly solve each problem separately. Recently however, we have been approached by Texas Commiss...
Kun Zhang, Wei Fan, Xiaojing Yuan, Ian Davidson, X...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
15 years 10 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
ICDAR
1999
IEEE
15 years 2 months ago
Segmenting Documents using Multiple Lexical Features
A method is presented for segmenting documents into conceptually related areas. Determining the equivalence of text is often based on the number of word repetitions. This approach...
Amanda C. Jobbins, Lindsay J. Evett
EAAI
2010
130views more  EAAI 2010»
14 years 10 months ago
Fault diagnosis in railway track circuits using Dempster-Shafer classifier fusion
This paper addresses the problem of fault detection and isolation in railway track circuits. A track circuit can be considered as a large-scale system composed of a series of trim...
Latifa Oukhellou, Alexandra Debiolles, Thierry Den...
AAAI
2010
14 years 11 months ago
Recognizing Multi-Agent Activities from GPS Data
Recent research has shown that surprisingly rich models of human behavior can be learned from GPS (positional) data. However, most research to date has concentrated on modeling si...
Adam Sadilek, Henry A. Kautz