Sciweavers

839 search results - page 110 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
105
Voted
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 6 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
ICML
2009
IEEE
16 years 1 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
VLDB
2003
ACM
156views Database» more  VLDB 2003»
16 years 28 days ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
KDD
2001
ACM
222views Data Mining» more  KDD 2001»
15 years 5 months ago
The PERSEUS Project: Creating Personalized Multimedia News Portal
This paper describes the Perseus project, which is devoted to developing techniques and tools for creating personalized multimedia news portals. The purpose of a personalized mult...
Victor Kulesh, Valery A. Petrushin, Ishwar K. Seth...
105
Voted
APN
2005
Springer
15 years 6 months ago
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Pro...
Boudewijn F. van Dongen, Ana Karla A. de Medeiros,...