Sciweavers

1274 search results - page 200 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
KDD
2002
ACM
119views Data Mining» more  KDD 2002»
15 years 10 months ago
Evaluating classifiers' performance in a constrained environment
In this paper, we focus on methodology of finding a classifier with a minimal cost in presence of additional performance constraints. ROCCH analysis, where accuracy and cost are i...
Anna Olecka
GFKL
2007
Springer
180views Data Mining» more  GFKL 2007»
15 years 3 months ago
Content-based Dimensionality Reduction for Recommender Systems
Recommender Systems are gaining widespread acceptance in e-commerce applications to confront the information overload problem. Collaborative Filtering (CF) is a successful recommen...
Panagiotis Symeonidis
ICDM
2002
IEEE
148views Data Mining» more  ICDM 2002»
15 years 2 months ago
SLPMiner: An Algorithm for Finding Frequent Sequential Patterns Using Length-Decreasing Support Constraint
Over the years, a variety of algorithms for finding frequent sequential patterns in very large sequential databases have been developed. The key feature in most of these algorith...
Masakazu Seno, George Karypis
SDM
2007
SIAM
86views Data Mining» more  SDM 2007»
14 years 11 months ago
Identifying Bundles of Product Options using Mutual Information Clustering
Mass-produced goods tend to be highly standardized in order to maximize manufacturing efficiencies. Some high-value goods with limited production quantities remain much less stand...
Claudia Perlich, Saharon Rosset
ICDM
2010
IEEE
228views Data Mining» more  ICDM 2010»
14 years 7 months ago
Active Learning from Multiple Noisy Labelers with Varied Costs
In active learning, where a learning algorithm has to purchase the labels of its training examples, it is often assumed that there is only one labeler available to label examples, ...
Yaling Zheng, Stephen D. Scott, Kun Deng