Sciweavers

839 search results - page 98 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
15 years 2 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
15 years 5 months ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
CORR
2004
Springer
140views Education» more  CORR 2004»
15 years 16 days ago
Integrating Defeasible Argumentation and Machine Learning Techniques
The field of machine learning (ML) is concerned with the question of how to construct algorithms that automatically improve with experience. In recent years many successful ML app...
Sergio Alejandro Gómez, Carlos Iván ...
95
Voted
KI
2002
Springer
15 years 10 days ago
Employing Text Mining for Semantic Tagging in DIAsDEM
Both public and private organizations have been accumulating large volumes of electronically available text documents for the past years. However, to turn text archives into profi...
Karsten Winkler, Myra Spiliopoulou
99
Voted
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 1 months ago
Real-time ranking with concept drift using expert advice
In many practical applications, one is interested in generating a ranked list of items using information mined from continuous streams of data. For example, in the context of comp...
Hila Becker, Marta Arias