Sciweavers

2032 search results - page 294 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
FUIN
2000
109views more  FUIN 2000»
15 years 2 months ago
Building Knowledge Scouts Using KGL Metalanguage
Knowledge scouts are software agents that autonomously search for and synthesize user-oriented knowledge (target knowledge) in large local or distributed databases. A knowledge ge...
Ryszard S. Michalski, Kenneth A. Kaufman
SSDBM
2010
IEEE
188views Database» more  SSDBM 2010»
15 years 7 months ago
Similarity Estimation Using Bayes Ensembles
Similarity search and data mining often rely on distance or similarity functions in order to provide meaningful results and semantically meaningful patterns. However, standard dist...
Tobias Emrich, Franz Graf, Hans-Peter Kriegel, Mat...
139
Voted
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 8 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
JCST
2011
89views more  JCST 2011»
14 years 9 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
DATAMINE
2006
127views more  DATAMINE 2006»
15 years 2 months ago
Computing LTS Regression for Large Data Sets
Least trimmed squares (LTS) regression is based on the subset of h cases (out of n) whose least squares t possesses the smallest sum of squared residuals. The coverage h may be se...
Peter Rousseeuw, Katrien van Driessen