Sciweavers

839 search results - page 127 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
92
Voted
SAC
2005
ACM
15 years 6 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
130
Voted
IAJIT
2010
155views more  IAJIT 2010»
14 years 10 months ago
Evaluation of text clustering methods using wordnet
: The increasing number of digitized texts presently available notably on the Web has developed an acute need in text mining techniques. Clustering systems are used more and more o...
Abdelmalek Amine, Zakaria Elberrichi, Michel Simon...
101
Voted
BMCBI
2006
160views more  BMCBI 2006»
15 years 25 days ago
MIMAS: an innovative tool for network-based high density oligonucleotide microarray data management and annotation
Background: The high-density oligonucleotide microarray (GeneChip) is an important tool for molecular biological research aiming at large-scale detection of small nucleotide polym...
Leandro Hermida, Olivier Schaad, Philippe Demougin...
101
Voted
GISCIENCE
2008
Springer
112views GIS» more  GISCIENCE 2008»
15 years 1 months ago
Decentralized Movement Pattern Detection amongst Mobile Geosensor Nodes
Movement patterns, like flocking and converging, leading and following, are examples of high-level process knowledge derived from lowlevel trajectory data. Conventional techniques...
Patrick Laube, Matt Duckham, Thomas Wolle
DKE
2002
218views more  DKE 2002»
15 years 17 days ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...