Sciweavers

3651 search results - page 143 / 731
» Data Mining for Security Applications
Sort
View
KDD
2005
ACM
171views Data Mining» more  KDD 2005»
16 years 5 months ago
Deriving marketing intelligence from online discussion
Weblogs and message boards provide online forums for discussion that record the voice of the public. Woven into this mass of discussion is a wide range of opinion and commentary a...
Natalie S. Glance, Matthew Hurst, Kamal Nigam, Mat...
DEXAW
2005
IEEE
133views Database» more  DEXAW 2005»
15 years 7 months ago
Inductive Databases: Towards a New Generation of Databases for Knowledge Discovery
Data mining applications are typically used in the decision making process. The Knowledge Discovery Process (KDD process for short) is a typical iterative process, in which not on...
Rosa Meo
EDBTW
2010
Springer
15 years 3 months ago
A decision support system to improve e-learning environments
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
Marta E. Zorrilla, Diego García, Elena &Aac...
ICDCS
2008
IEEE
15 years 11 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
CSREASAM
2006
15 years 6 months ago
Securing Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...