Sciweavers

839 search results - page 78 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
KDD
2007
ACM
132views Data Mining» more  KDD 2007»
16 years 1 months ago
LungCAD: a clinically approved, machine learning system for lung cancer detection
We present LungCAD, a computer aided diagnosis (CAD) system that employs a classification algorithm for detecting solid pulmonary nodules from CT thorax studies. We briefly descri...
R. Bharat Rao, Jinbo Bi, Glenn Fung, Marcos Salgan...
106
Voted
WIESS
2000
15 years 1 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 7 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
118
Voted
JIDM
2010
145views more  JIDM 2010»
14 years 11 months ago
Mining Relevant and Extreme Patterns on Climate Time Series with CLIPSMiner
One of the most important challenges for the researchers in the 21st Century is related to global heating and climate change that can have as consequence the intensification of na...
Luciana A. S. Romani, Ana Maria Heuminski de &Aacu...
99
Voted
IJCAI
2003
15 years 2 months ago
Intelligent Techniques for Web Personalization
In this chapter we provide a comprehensive overview of the topic of Intelligent Techniques for Web Personalization. Web Personalization is viewed as an application of data mining a...
Sarabjot S. Anand, Bamshad Mobasher