Sciweavers

3651 search results - page 152 / 731
» Data Mining for Security Applications
Sort
View
ICDM
2002
IEEE
162views Data Mining» more  ICDM 2002»
15 years 10 months ago
Recognition of Common Areas in a Web Page Using Visual Information: a possible application in a page classification
Extracting and processing information from web pages is an important task in many areas like constructing search engines, information retrieval, and data mining from the Web. Comm...
Milos Kovacevic, Michelangelo Diligenti, Marco Gor...
155
Voted
SYNASC
2005
IEEE
130views Algorithms» more  SYNASC 2005»
15 years 10 months ago
Natural Computation for Business Intelligence from Web Usage Mining
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical ...
Ajith Abraham
ISMIS
2009
Springer
15 years 11 months ago
Novelty Detection from Evolving Complex Data Streams with Time Windows
Abstract. Novelty detection in data stream mining denotes the identification of new or unknown situations in a stream of data elements flowing continuously in at rapid rate. This...
Michelangelo Ceci, Annalisa Appice, Corrado Loglis...
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
16 years 5 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
KDD
2006
ACM
208views Data Mining» more  KDD 2006»
16 years 5 months ago
Frequent subgraph mining in outerplanar graphs
In recent years there has been an increased interest in frequent pattern discovery in large databases of graph structured objects. While the frequent connected subgraph mining pro...
Tamás Horváth, Jan Ramon, Stefan Wro...