Sciweavers

2032 search results - page 350 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 5 days ago
Multi-label hypothesis reuse
Multi-label learning arises in many real-world tasks where an object is naturally associated with multiple concepts. It is well-accepted that, in order to achieve a good performan...
Sheng-Jun Huang, Yang Yu, Zhi-Hua Zhou
CAIP
2003
Springer
236views Image Analysis» more  CAIP 2003»
15 years 3 months ago
Efficient Algorithm of Eye Image Check for Robust Iris Recognition System
For the improvement of iris recognition system performance, the filtering algorithm that picks out counterfeit and noisy data is very important. In this paper, as a part of preproc...
Jain Jang, Kwiju Kim, Yillbyung Lee
ACSAC
2008
IEEE
15 years 4 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
DIMVA
2008
14 years 11 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
JODS
2006
206views Data Mining» more  JODS 2006»
14 years 9 months ago
Emergent Semantics in Knowledge Sifter: An Evolutionary Search Agent Based on Semantic Web Services
This paper addresses the various facets of emergent semantics in content retrieval systems such as Knowledge Sifter, an architecture and system based on the use of specialized agen...
Larry Kerschberg, Hanjo Jeong, Wooju Kim