Sciweavers

839 search results - page 40 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
87
Voted
ICDM
2003
IEEE
184views Data Mining» more  ICDM 2003»
15 years 5 months ago
Detecting Patterns of Change Using Enhanced Parallel Coordinates Visualization
Analyzing data to find trends, correlations, and stable patterns is an important problem for many industrial applications. In this paper, we propose a new technique based on paral...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
PAKDD
2004
ACM
94views Data Mining» more  PAKDD 2004»
15 years 5 months ago
Self-Similar Mining of Time Association Rules
Although the task of mining association rules has received considerable attention in the literature, algorithms to find time association rules are often inadequate, by either miss...
Daniel Barbará, Ping Chen, Zohreh Nazeri
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 7 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
113
Voted
ICDM
2002
IEEE
109views Data Mining» more  ICDM 2002»
15 years 5 months ago
Using Text Mining to Infer Semantic Attributes for Retail Data Mining
Current Data Mining techniques usually do not have a mechanism to automatically infer semantic features inherent in the data being “mined”. The semantics are either injected i...
Rayid Ghani, Andrew E. Fano
VLDB
2005
ACM
196views Database» more  VLDB 2005»
15 years 6 months ago
Summarizing and Mining Inverse Distributions on Data Streams via Dynamic Inverse Sampling
Emerging data stream management systems approach the challenge of massive data distributions which arrive at high speeds while there is only small storage by summarizing and minin...
Graham Cormode, S. Muthukrishnan, Irina Rozenbaum