Sciweavers

839 search results - page 79 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
DKE
2006
157views more  DKE 2006»
15 years 19 days ago
XML structural delta mining: Issues and challenges
Recently, there is an increasing research efforts in XML data mining. These research efforts largely assumed that XML documents are static. However, in reality, the documents are ...
Qiankun Zhao, Ling Chen 0002, Sourav S. Bhowmick, ...
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 1 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
OSDI
2004
ACM
16 years 28 days ago
Microreboot - A Technique for Cheap Recovery
A significant fraction of software failures in large-scale Internet systems are cured by rebooting, even when the exact failure causes are unknown. However, rebooting can be expen...
George Candea, Shinichi Kawamoto, Yuichi Fujiki, G...
ETRICS
2006
15 years 4 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
105
Voted
EDM
2009
175views Data Mining» more  EDM 2009»
14 years 10 months ago
Detecting Symptoms of Low Performance Using Production Rules
E-Learning systems offer students innovative and attractive ways of learning through augmentation or substitution of traditional lectures and exercises with online learning materia...
Javier Bravo Agapito, Alvaro Ortigosa