Sciweavers

1274 search results - page 85 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
114
Voted
ICMCS
2009
IEEE
140views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Resource-adaptive multimedia analysis on stream mining systems
Large-scale multimedia semantic concept detection requires realtime identification of a set of concepts in streaming video or large image datasets. The potentially high data volum...
Deepak S. Turaga, Rong Yan, Olivier Verscheure, Br...
106
Voted
IJWET
2008
98views more  IJWET 2008»
15 years 18 days ago
Warehousing complex data from the web
: Data warehousing and Online Analytical Processing (OLAP) technologies are now moving onto handling complex data that mostly originate from the web. However, integrating such data...
Omar Boussaid, Jérôme Darmont, Fadila...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 7 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
97
Voted
EMNLP
2010
14 years 10 months ago
The Necessity of Combining Adaptation Methods
Problems stemming from domain adaptation continue to plague the statistical natural language processing community. There has been continuing work trying to find general purpose al...
Ming-Wei Chang, Michael Connor, Dan Roth
ETRICS
2006
15 years 4 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...