Sciweavers

839 search results - page 83 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
KDD
2002
ACM
149views Data Mining» more  KDD 2002»
16 years 1 months ago
A system for real-time competitive market intelligence
A method is described for real-time market intelligence and competitive analysis. News stories are collected online for a designated group of companies. The goal is to detect crit...
Sholom M. Weiss, Naval K. Verma
101
Voted
VLDB
2004
ACM
163views Database» more  VLDB 2004»
15 years 6 months ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...
106
Voted
BMCBI
2010
129views more  BMCBI 2010»
15 years 23 days ago
LAITOR - Literature Assistant for Identification of Terms co-Occurrences and Relationships
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...
88
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
129
Voted
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 1 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher