Sciweavers

839 search results - page 80 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
AINA
2006
IEEE
15 years 6 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
IEAAIE
2005
Springer
15 years 6 months ago
Mining Generalized Association Rules on Biomedical Literature
The discovery of new and potentially meaningful relationships between concepts in the biomedical literature has attracted the attention of a lot of researchers in text mining. The ...
Margherita Berardi, Michele Lapi, Pietro Leo, Corr...
102
Voted
ICCS
2007
Springer
15 years 6 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
118
Voted
DGO
2009
88views Education» more  DGO 2009»
15 years 1 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...
TSMC
2011
228views more  TSMC 2011»
14 years 7 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...