Sciweavers

839 search results - page 91 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
130
Voted
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
16 years 1 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
134
Voted
DKE
2010
167views more  DKE 2010»
14 years 10 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
101
Voted
DAC
2007
ACM
16 years 1 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
DEXA
2004
Springer
94views Database» more  DEXA 2004»
15 years 6 months ago
Visualization Process of Temporal Data
Abstract. Temporal data are abundantly present in many application domains such as banking, financial, clinical, geographical applications and so on. Temporal data have been extens...
Chaouki Daassi, Laurence Nigay, Marie-Christine Fa...
90
Voted
EDM
2010
121views Data Mining» more  EDM 2010»
14 years 11 months ago
Identifying Students' Inquiry Planning Using Machine Learning
This research investigates the detection of student meta-cognitive planning processes in real-time using log tracing techniques. We use fine and coarse-grained data distillation, i...
Orlando Montalvo, Ryan Shaun Joazeiro de Baker, Mi...