Sciweavers

2032 search results - page 141 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
139
Voted
ICDM
2010
IEEE
168views Data Mining» more  ICDM 2010»
15 years 18 days ago
Anomaly Detection Using an Ensemble of Feature Models
We present a new approach to semi-supervised anomaly detection. Given a set of training examples believed to come from the same distribution or class, the task is to learn a model ...
Keith Noto, Carla E. Brodley, Donna K. Slonim
117
Voted
KDD
1998
ACM
122views Data Mining» more  KDD 1998»
15 years 6 months ago
Memory Placement Techniques for Parallel Association Mining
Many data mining tasks (e.g., Association Rules, Sequential Patterns) use complex pointer-based data structures (e.g., hash trees) that typically suffer from sub-optimal data loca...
Srinivasan Parthasarathy, Mohammed Javeed Zaki, We...
136
Voted
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
16 years 3 months ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
126
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 3 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
136
Voted
ICML
2010
IEEE
15 years 3 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...