Sciweavers

3651 search results - page 157 / 731
» Data Mining for Security Applications
Sort
View
KDD
1995
ACM
182views Data Mining» more  KDD 1995»
15 years 8 months ago
Accelerated Quantification of Bayesian Networks with Incomplete Data
Probabilistic expert systemsbased on Bayesian networks(BNs)require initial specification both a qualitative graphical structure and quantitative assessmentof conditional probabili...
Bo Thiesson
KDD
2004
ACM
114views Data Mining» more  KDD 2004»
16 years 5 months ago
Scalable mining of large disk-based graph databases
Mining frequent structural patterns from graph databases is an interesting problem with broad applications. Most of the previous studies focus on pruning unfruitful search subspac...
Chen Wang, Wei Wang 0009, Jian Pei, Yongtai Zhu, B...
HPCC
2005
Springer
15 years 10 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...
ICDCS
2008
IEEE
15 years 11 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
ICDM
2007
IEEE
148views Data Mining» more  ICDM 2007»
15 years 11 months ago
Binary Matrix Factorization with Applications
An interesting problem in Nonnegative Matrix Factorization (NMF) is to factorize the matrix X which is of some specific class, for example, binary matrix. In this paper, we exten...
Zhongyuan Zhang, Tao Li, Chris H. Q. Ding, Xiangsu...