Sciweavers

2032 search results - page 261 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
JAIR
2010
181views more  JAIR 2010»
14 years 12 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
15 years 12 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
NAR
2010
123views more  NAR 2010»
14 years 12 months ago
Discovering causal signaling pathways through gene-expression patterns
High-throughput gene-expression studies result in lists of differentially expressed genes. Most current meta-analyses of these gene lists include searching for significant members...
Jignesh R. Parikh, Bertram Klinger, Yu Xia, Jarrod...
PR
2007
149views more  PR 2007»
15 years 4 months ago
Real-time detection of steam in video images
In this paper, we present a real-time image processing technique for the detection of steam in video images. The assumption made is that the presence of steam acts as a blurring p...
Ricardo J. Ferrari, H. Zhang, C. R. Kube
KDD
2002
ACM
149views Data Mining» more  KDD 2002»
16 years 5 months ago
A system for real-time competitive market intelligence
A method is described for real-time market intelligence and competitive analysis. News stories are collected online for a designated group of companies. The goal is to detect crit...
Sholom M. Weiss, Naval K. Verma