Sciweavers

839 search results - page 60 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
CCS
2006
ACM
15 years 4 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
WISE
2010
Springer
14 years 10 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
14 years 10 months ago
Discovering Temporal Features and Relations of Activity Patterns
An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
Ehsan Nazerfard, Parisa Rashidi, Diane J. Cook
ICDM
2003
IEEE
95views Data Mining» more  ICDM 2003»
15 years 5 months ago
Evolutionary Gabor Filter Optimization with Application to Vehicle Detection
Abstract—Despite the considerable amount of research work on the application of Gabor filters in pattern classification, their design and selection have been mostly done on a t...
Zehang Sun, George Bebis, Ronald Miller
103
Voted
WIS
2004
15 years 1 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...