Sciweavers

3651 search results - page 15 / 731
» Data Mining for Security Applications
Sort
View
81
Voted
KDD
2001
ACM
186views Data Mining» more  KDD 2001»
16 years 23 days ago
Detecting graph-based spatial outliers: algorithms and applications (a summary of results)
Shashi Shekhar, Chang-Tien Lu, Pusheng Zhang
KDD
1994
ACM
92views Data Mining» more  KDD 1994»
15 years 4 months ago
An Application of KEFM to the Analysis of Healthcare Information
Christopher J. Matheus, Gregory Piatetsky-Shapiro,...
108
Voted
CORR
2002
Springer
139views Education» more  CORR 2002»
15 years 5 days ago
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications
Currently statistical and artificial neural network methods dominate in financial data mining. Alternative relational (symbolic) data mining methods have shown their effectiveness...
Boris Kovalerchuk, Evgenii Vityaev, H. Yusupov
111
Voted
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 23 days ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
IKE
2010
14 years 10 months ago
Potential Application of Contextual Information Processing To Data Mining
Contextual processing is a new emerging field based on the notion that information surrounding an event lends new meaning to the interpretation of the event. Data mining is the pr...
Gregory Vert, Anitha Chennamaneni, S. Sitharama Iy...