Sciweavers

839 search results - page 93 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
IIWAS
2004
15 years 2 months ago
Combining Text And Image Analysis in The Web Filtering System "WEBGUARD"
Web applications increasingly utilize search techniques that heavily rely on content-based text and image analyses. For example, for parental site filtering, it is necessary to id...
Mohamed Hammami, Youssef Chahir, Liming Chen
JTAER
2010
121views more  JTAER 2010»
14 years 11 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
203
Voted
SIGMOD
2008
ACM
167views Database» more  SIGMOD 2008»
16 years 24 days ago
DiMaC: a system for cleaning disguised missing data
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
115
Voted
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
15 years 6 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
128
Voted
KDD
2012
ACM
202views Data Mining» more  KDD 2012»
13 years 3 months ago
UFIMT: an uncertain frequent itemset mining toolbox
In recent years, mining frequent itemsets over uncertain data has attracted much attention in the data mining community. Unlike the corresponding problem in deterministic data, th...
Yongxin Tong, Lei Chen 0002, Philip S. Yu