Sciweavers

2032 search results - page 262 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
15 years 6 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
BMCBI
2008
143views more  BMCBI 2008»
15 years 5 months ago
Automatic detection of exonic splicing enhancers (ESEs) using SVMs
Background: Exonic splicing enhancers (ESEs) activate nearby splice sites and promote the inclusion (vs. exclusion) of exons in which they reside, while being a binding site for S...
Britta Mersch, Alexander Gepperth, Sándor S...
FLAIRS
2007
15 years 7 months ago
Low-Effort Labeling of Network Events for Intrusion Detection in WLANs
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
KDD
2004
ACM
170views Data Mining» more  KDD 2004»
15 years 10 months ago
Estimating the size of the telephone universe: a Bayesian Mark-recapture approach
Mark-recapture models have for many years been used to estimate the unknown sizes of animal and bird populations. In this article we adapt a finite mixture mark-recapture model i...
David Poole
ICASSP
2011
IEEE
14 years 8 months ago
Dereverberation of ultrasound echo data in vascular imaging applications
Two-dimensional speckle tracking methods have shown great promise in imaging tissue motion and deformations in the vicinity of blood vessels offering the promise of new methods fo...
Emad S. Ebbini, Yayun Wan, Dalong Liu