Sciweavers

3651 search results - page 131 / 731
» Data Mining for Security Applications
Sort
View
CIKM
2010
Springer
15 years 3 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
VLDB
2007
ACM
179views Database» more  VLDB 2007»
16 years 5 months ago
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data
Market analysis is a representative data analysis process with many applications. In such an analysis, critical numerical measures, such as profit and sales, fluctuate over time a...
Xiaolei Li, Jiawei Han
ICANN
2009
Springer
15 years 2 months ago
Mining Rules for the Automatic Selection Process of Clustering Methods Applied to Cancer Gene Expression Data
Different algorithms have been proposed in the literature to cluster gene expression data, however there is no single algorithm that can be considered the best one independently on...
André C. A. Nascimento, Ricardo Bastos Cava...
VLDB
2004
ACM
143views Database» more  VLDB 2004»
15 years 10 months ago
GPX: Interactive Mining of Gene Expression Data
Discovering co-expressed genes and coherent expression patterns in gene expression data is an important data analysis task in bioinformatics research and biomedical applications. ...
Daxin Jiang, Jian Pei, Aidong Zhang
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 5 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin