Sciweavers

839 search results - page 50 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
107
Voted
KDD
1997
ACM
146views Data Mining» more  KDD 1997»
15 years 4 months ago
Density-Connected Sets and their Application for Trend Detection in Spatial Databases
1 Several clustering algorithms have been proposed for class identification in spatial databases such as earth observation databases. The effectivity of the well-known algorithms ...
Martin Ester, Hans-Peter Kriegel, Jörg Sander...
92
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 19 days ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
122
Voted
EDM
2009
184views Data Mining» more  EDM 2009»
14 years 10 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
109
Voted
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 6 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
94
Voted
WWW
2011
ACM
14 years 7 months ago
Detecting group review spam
It is well-known that many online reviews are not written by genuine users of products, but by spammers who write fake reviews to promote or demote some target products. Although ...
Arjun Mukherjee, Bing Liu, Junhui Wang, Natalie S....