Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
This paper describes our experience with applying data mining techniques to the problem of fraud detection in spatio-temporal health data in Medicare Australia. A modular framework...
Kee Siong Ng, Yin Shan, D. Wayne Murray, Alison Su...
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Mining frequent itemsets from transactional datasets is a well known problem with good algorithmic solutions. In the case of uncertain data, however, several new techniques have be...
Abstract. In this paper we describe an Integrated Development System for Instructional Model for E-learning (INDESIME) to create and to maintain instructional models using adaptive...