Sciweavers

1274 search results - page 54 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
FLAIRS
2001
15 years 1 months ago
Data Mining with Distributed Agents in E-Commerce Applications
In this paperwedescribe the prototypeof a yellowpageservice for customersin a distributed cyber-shoppingmall. This application combines distributed data miningwith agent technolog...
Yugyung Lee, James Geller, Eun Kyo Park, Changgyu ...
114
Voted
ICCS
2003
Springer
15 years 5 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
103
Voted
DGO
2003
137views Education» more  DGO 2003»
15 years 1 months ago
Time-Series Data Mining in a Geospatial Decision Support
This paper presents an overview of the motivation for, and the use of time-series data mining in, a Geospatial Decision Support System (GDSS). Our approach is based on a combinati...
Dan Li, Sherri K. Harms, Steve Goddard, William J....
86
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 19 days ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
HAIS
2009
Springer
15 years 5 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...