Sciweavers

3651 search results - page 134 / 731
» Data Mining for Security Applications
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 5 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2008
ACM
110views Data Mining» more  KDD 2008»
16 years 5 months ago
Mining preferences from superior and inferior examples
Mining user preferences plays a critical role in many important applications such as customer relationship management (CRM), product and service recommendation, and marketing camp...
Bin Jiang, Jian Pei, Xuemin Lin, David W. Cheung, ...
ISI
2005
Springer
15 years 10 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
KDD
2005
ACM
143views Data Mining» more  KDD 2005»
16 years 5 months ago
SVM selective sampling for ranking with application to data retrieval
Learning ranking (or preference) functions has been a major issue in the machine learning community and has produced many applications in information retrieval. SVMs (Support Vect...
Hwanjo Yu
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
16 years 5 months ago
Partial example acquisition in cost-sensitive learning
It is often expensive to acquire data in real-world data mining applications. Most previous data mining and machine learning research, however, assumes that a fixed set of trainin...
Victor S. Sheng, Charles X. Ling