Sciweavers

839 search results - page 81 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
TVLSI
1998
118views more  TVLSI 1998»
15 years 8 days ago
Automatic generation of error control codes for computer applications
— This paper proposes a methodology, implemented in a tool, to automatically generate the main classes of error control codes (ECC’s) widely applied in computer memory systems ...
Franco Fummi, Donatella Sciuto, Cristina Silvano
92
Voted
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 6 months ago
Site-Independent Template-Block Detection
Detection of template and noise blocks in web pages is an important step in improving the performance of information retrieval and content extraction. Of the many approaches propos...
Aleksander Kolcz, Wen-tau Yih
87
Voted
WSC
2004
15 years 2 months ago
A Generalized Multiple Response Surface Methodology for Complex Computer Simulation Applications
This work provides a generalization of the traditional response surface methodology (RSM) that can be applied to complex, multi-objective simulation studies. These problems involv...
Jeffrey B. Schamburg, Donald E. Brown
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
15 years 7 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
IMC
2009
ACM
15 years 7 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...