Sciweavers

839 search results - page 41 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
115
Voted
EMNLP
2009
14 years 10 months ago
Chinese Novelty Mining
Automated mining of novel documents or sentences from chronologically ordered documents or sentences is an open challenge in text mining. In this paper, we describe the preprocess...
Yi Zhang, Flora S. Tsai
148
Voted
EUMAS
2006
15 years 1 months ago
A Customizable Multi-Agent System for Distributed Data Mining
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Giancarlo Fortino, Giuseppe Di Fatta
PKDD
2009
Springer
174views Data Mining» more  PKDD 2009»
15 years 7 months ago
Active and Semi-supervised Data Domain Description
Data domain description techniques aim at deriving concise descriptions of objects belonging to a category of interest. For instance, the support vector domain description (SVDD) l...
Nico Görnitz, Marius Kloft, Ulf Brefeld
102
Voted
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 6 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
85
Voted
EUSFLAT
2007
186views Fuzzy Logic» more  EUSFLAT 2007»
15 years 2 months ago
Forest of Fuzzy Decision Trees and Their Application in Video Mining
One of the great challenges today is to index videos with high-level semantic concepts or features. The basis of our approach is to use a fuzzy decision trees (FDT) to construct t...
Marcin Detyniecki, Christophe Marsala