Sciweavers

2032 search results - page 17 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
IRI
2008
IEEE
15 years 4 months ago
Compound record clustering algorithm for design pattern detection by decision tree learning
Recovering design patterns applied in a system can help refactoring the system. Machine learning algorithms have been successfully applied in mining data patterns. However, one of...
Jing Dong, Yongtao Sun, Yajing Zhao
EDBT
2004
ACM
94views Database» more  EDBT 2004»
15 years 9 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
SIGSOFT
2005
ACM
15 years 3 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
CBMS
2007
IEEE
15 years 4 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
CIDM
2009
IEEE
15 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder