Sciweavers

3651 search results - page 122 / 731
» Data Mining for Security Applications
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 5 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 5 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han
ACSC
2005
IEEE
15 years 10 months ago
A Delivery Framework for Health Data Mining and Analytics
The iHealth Explorer tool, developed by CSIRO and DoHA, delivers web services type data mining and analytic facilities over a web interface, providing desktop access to sophistica...
Damien McAullay, Graham J. Williams, Jie Chen, Hui...
MSR
2010
ACM
15 years 10 months ago
The Ultimate Debian Database: Consolidating bazaar metadata for Quality Assurance and data mining
—FLOSS distributions like RedHat and Ubuntu require a lot more complex infrastructures than most other FLOSS projects. In the case of community-driven distributions like Debian, ...
Lucas Nussbaum, Stefano Zacchiroli
158
Voted
CORR
2000
Springer
230views Education» more  CORR 2000»
15 years 4 months ago
Integrating E-Commerce and Data Mining: Architecture and Challenges
We show that the e-commerce domain can provide all the right ingredients for successful data mining. We describe an integrated architecture for supporting this integration. The ar...
Suhail Ansari, Ron Kohavi, Llew Mason, Zijian Zhen...