Sciweavers

3651 search results - page 137 / 731
» Data Mining for Security Applications
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 6 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
177
Voted
ICTAI
1997
IEEE
15 years 9 months ago
Web Mining: Information and Pattern Discovery on the World Wide Web
Application of data mining techniques to the World Wide Web, referred to as Web mining, has been the focus of several recent research projects and papers. However, there is no est...
Robert Cooley, Bamshad Mobasher, Jaideep Srivastav...
JIIS
2000
119views more  JIIS 2000»
15 years 4 months ago
Knowledge Discovery from Series of Interval Events
Knowledge discovery from data sets can be extensively automated by using data mining software tools. Techniques for mining series of interval events, however, have not been conside...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...
GI
1998
Springer
15 years 9 months ago
Self-Organizing Data Mining
"KnowledgeMiner" was designed to support the knowledge extraction process on a highly automated level. Implemented are 3 different GMDH-type self-organizing modeling algo...
Frank Lemke, Johann-Adolf Müller
ICDM
2005
IEEE
161views Data Mining» more  ICDM 2005»
15 years 10 months ago
Making Logistic Regression a Core Data Mining Tool with TR-IRLS
Binary classification is a core data mining task. For large datasets or real-time applications, desirable classifiers are accurate, fast, and need no parameter tuning. We presen...
Paul Komarek, Andrew W. Moore