Sciweavers

3651 search results - page 141 / 731
» Data Mining for Security Applications
Sort
View
136
Voted
VLDB
1998
ACM
112views Database» more  VLDB 1998»
15 years 9 months ago
Incremental Clustering for Mining in a Data Warehousing Environment
Data warehouses provide a great deal of opportunities for performing data mining tasks such as classification and clustering. Typically, updates are collected and applied to the d...
Martin Ester, Hans-Peter Kriegel, Jörg Sander...
MHCI
2009
Springer
15 years 11 months ago
Detecting physical shock by a mobile phone and its applications in security and emergency
In this paper, we propose a method for detecting physical shock by a mobile phone and its applications in security and emergency scenarios. We use acceleration signal provided by ...
Hamed Ketabdar
143
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 5 months ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
KDD
2008
ACM
234views Data Mining» more  KDD 2008»
16 years 5 months ago
Angle-based outlier detection in high-dimensional data
Detecting outliers in a large set of data objects is a major data mining task aiming at finding different mechanisms responsible for different groups of objects in a data set. All...
Hans-Peter Kriegel, Matthias Schubert, Arthur Zime...
IEEEIAS
2009
IEEE
15 years 11 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang