Sciweavers

1274 search results - page 84 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
PKDD
2007
Springer
114views Data Mining» more  PKDD 2007»
15 years 6 months ago
Robust Visual Mining of Data with Error Information
Abstract. Recent results on robust density-based clustering have indicated that the uncertainty associated with the actual measurements can be exploited to locate objects that are ...
Jianyong Sun, Ata Kabán, Somak Raychaudhury
IDA
2007
Springer
15 years 17 days ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
15 years 5 months ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
IJSR
2010
181views more  IJSR 2010»
14 years 11 months ago
Multi-Part People Detection Using 2D Range Data
People detection is a key capacity for robotics systems that have to interact with humans. This paper addresses the problem of detecting people using multiple layers of 2D laser ra...
Óscar Martínez Mozos, Ryo Kurazume, ...
93
Voted
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
16 years 1 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider