Sciweavers

839 search results - page 92 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
122
Voted
CIKM
2005
Springer
15 years 6 months ago
Opportunity map: a visualization framework for fast identification of actionable knowledge
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
95
Voted
MSR
2009
ACM
15 years 7 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...
97
Voted
ASPDAC
2004
ACM
169views Hardware» more  ASPDAC 2004»
15 years 6 months ago
Design of real-time VGA 3-D image sensor using mixed-signal techniques
— We have developed the first real-time 3-D image sensor with VGA pixel resolution using mixed-signal techniques to achieve high-speed and high-accuracy range calculation based ...
Yusuke Oike, Makoto Ikeda, Kunihiro Asada
113
Voted
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 1 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
94
Voted
VLDB
2005
ACM
125views Database» more  VLDB 2005»
15 years 6 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi