Sciweavers

336 search results - page 13 / 68
» Data Mining Using Fractals and Power Laws
Sort
View
DAMON
2006
Springer
15 years 3 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
ER
2007
Springer
128views Database» more  ER 2007»
15 years 6 months ago
Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering
The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
Luis Otávio Alvares, Vania Bogorny, Jos&eac...
WEBI
2009
Springer
15 years 6 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
16 years 1 months ago
Approximately Processing Multi-granularity Aggregate Queries over Data Streams
Aggregate monitoring over data streams is attracting more and more attention in research community due to its broad potential applications. Existing methods suffer two problems, 1...
Shouke Qin, Weining Qian, Aoying Zhou
ICDM
2006
IEEE
137views Data Mining» more  ICDM 2006»
15 years 5 months ago
Mining Complex Time-Series Data by Learning Markovian Models
In this paper, we propose a novel and general approach for time-series data mining. As an alternative to traditional ways of designing specific algorithm to mine certain kind of ...
Yi Wang, Lizhu Zhou, Jianhua Feng, Jianyong Wang, ...