Sciweavers

3651 search results - page 160 / 731
» Data Mining for Security Applications
Sort
View
PVLDB
2010
146views more  PVLDB 2010»
14 years 12 months ago
HaLoop: Efficient Iterative Data Processing on Large Clusters
The growing demand for large-scale data mining and data analysis applications has led both industry and academia to design new types of highly scalable data-intensive computing pl...
Yingyi Bu, Bill Howe, Magdalena Balazinska, Michae...
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 10 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
KDD
2000
ACM
77views Data Mining» more  KDD 2000»
15 years 8 months ago
Small is beautiful: discovering the minimal set of unexpected patterns
A drawback of most traditional data mining methods is that they do not leverage prior knowledge of users. In many business settings, managers and analysts have significant intuiti...
Balaji Padmanabhan, Alexander Tuzhilin
CORR
2011
Springer
229views Education» more  CORR 2011»
15 years 3 days ago
"Improved FCM algorithm for Clustering on Web Usage Mining"
In this paper we present clustering method is very sensitive to the initial center values ,requirements on the data set too high, and cannot handle noisy data the proposal method ...
K. Suresh
ICDM
2009
IEEE
205views Data Mining» more  ICDM 2009»
15 years 11 months ago
Active Selection of Sensor Sites in Remote Sensing Applications
— In a data-mining approach, a model for estimation of Aerosol Optical Depth (AOD) from satellite observations is learned using collocated satellite and groundbased observations....
Debasish Das, Zoran Obradovic, Slobodan Vucetic