Sciweavers

839 search results - page 117 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
GLOBECOM
2010
IEEE
14 years 10 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
116
Voted
KDD
2004
ACM
158views Data Mining» more  KDD 2004»
16 years 1 months ago
A generalized maximum entropy approach to bregman co-clustering and matrix approximation
Co-clustering is a powerful data mining technique with varied applications such as text clustering, microarray analysis and recommender systems. Recently, an informationtheoretic ...
Arindam Banerjee, Inderjit S. Dhillon, Joydeep Gho...
104
Voted
ICCS
2000
Springer
15 years 4 months ago
Conceptual Knowledge Discovery and Data Analysis
In this paper, we discuss Conceptual Knowledge Discovery in Databases (CKDD) in its connection with Data Analysis. Our approach is based on Formal Concept Analysis, a mathematical ...
Joachim Hereth Correia, Gerd Stumme, Rudolf Wille,...
KDD
2001
ACM
150views Data Mining» more  KDD 2001»
16 years 1 months ago
Empirical bayes screening for multi-item associations
This paper considers the framework of the so-called "market basket problem", in which a database of transactions is mined for the occurrence of unusually frequent item s...
William DuMouchel, Daryl Pregibon
94
Voted
KDD
2007
ACM
139views Data Mining» more  KDD 2007»
16 years 1 months ago
Raising the baseline for high-precision text classifiers
Many important application areas of text classifiers demand high precision and it is common to compare prospective solutions to the performance of Naive Bayes. This baseline is us...
Aleksander Kolcz, Wen-tau Yih