Sciweavers

2032 search results - page 310 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 9 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
ASUNAM
2009
IEEE
15 years 4 months ago
Modeling a Store's Product Space as a Social Network
A market basket is a set of products that form a single retail transaction. This purchase data of products can shed important light on how product(s) might influence sales of oth...
Troy Raeder, Nitesh V. Chawla
AUSDM
2008
Springer
243views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification
Term signal is an existing text representation that depicts a term as a vector of frequencies of occurrences in a number of user-defined partitions of a document. Although term si...
Supphachai Thaicharoen, Tom Altman, Krzysztof J. C...
ISCI
2008
116views more  ISCI 2008»
14 years 9 months ago
Discovery of maximum length frequent itemsets
The use of frequent itemsets has been limited by the high computational cost as well as the large number of resulting itemsets. In many real-world scenarios, however, it is often ...
Tianming Hu, Sam Yuan Sung, Hui Xiong, Qian Fu
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 3 months ago
Incorporating prior knowledge with weighted margin support vector machines
Like many purely data-driven machine learning methods, Support Vector Machine (SVM) classifiers are learned exclusively from the evidence presented in the training dataset; thus ...
Xiaoyun Wu, Rohini K. Srihari