Sciweavers

3651 search results - page 115 / 731
» Data Mining for Security Applications
Sort
View
109
Voted
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
15 years 11 months ago
CAPTCHA-based image labeling on the Soylent Grid
We introduce an open labeling platform for Computer Vision researchers based on Captchas, creating as a byproduct labeled image data sets while supporting web security. For the tw...
Peter Faymonville, Kai Wang, John Miller, Serge J....
KDD
2004
ACM
145views Data Mining» more  KDD 2004»
16 years 5 months ago
Mining coherent gene clusters from gene-sample-time microarray data
Extensive studies have shown that mining microarray data sets is important in bioinformatics research and biomedical applications. In this paper, we explore a novel type of genesa...
Daxin Jiang, Jian Pei, Murali Ramanathan, Chun Tan...
138
Voted
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
15 years 4 months ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 9 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 3 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...