Sciweavers

3651 search results - page 106 / 731
» Data Mining for Security Applications
Sort
View
SBBD
2007
126views Database» more  SBBD 2007»
15 years 6 months ago
Constraint-based Tree Pattern Mining
Abstract. A lot of recent applications dealing with complex data require sophisticated data structures (trees or graphs) for their specification. Recently, several techniques for ...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
ACSAC
1999
IEEE
15 years 9 months ago
Application-Level Isolation Using Data Inconsistency Detection
Recently, application-level isolation was introduced as an effective means of containing the damage that a suspicious user could inflict on data. In most cases, only a subset of t...
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
EDBT
2008
ACM
166views Database» more  EDBT 2008»
16 years 4 months ago
OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics
By comparing genomes among both closely and distally related species, comparative genomics analysis characterizes structures and functions of different genomes in both conserved a...
Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wan...
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
15 years 10 months ago
Discovering Frequent Arrangements of Temporal Intervals
In this paper we study a new problem in temporal pattern mining: discovering frequent arrangements of temporal intervals. We assume that the database consists of sequences of even...
Panagiotis Papapetrou, George Kollios, Stan Sclaro...
BMCBI
2005
251views more  BMCBI 2005»
15 years 4 months ago
Contextual weighting for Support Vector Machines in literature mining: an application to gene versus protein name disambiguation
Background: The ability to distinguish between genes and proteins is essential for understanding biological text. Support Vector Machines (SVMs) have been proven to be very effici...
Tapio Pahikkala, Filip Ginter, Jorma Boberg, Jouni...