Sciweavers

3651 search results - page 24 / 731
» Data Mining for Security Applications
Sort
View
FLAIRS
2001
14 years 11 months ago
Data Mining with Distributed Agents in E-Commerce Applications
In this paperwedescribe the prototypeof a yellowpageservice for customersin a distributed cyber-shoppingmall. This application combines distributed data miningwith agent technolog...
Yugyung Lee, James Geller, Eun Kyo Park, Changgyu ...
96
Voted
IISWC
2006
IEEE
15 years 4 months ago
An Architectural Characterization Study of Data Mining and Bioinformatics Workloads
— Data mining is the process of automatically finding implicit, previously unknown, and potentially useful information from large volumes of data. Recent advances in data extrac...
Berkin Özisikyilmaz, Ramanathan Narayanan, Jo...
CCGRID
2009
IEEE
15 years 5 months ago
Performance Issues in Parallelizing Data-Intensive Applications on a Multi-core Cluster
The deluge of available data for analysis demands the need to scale the performance of data mining implementations. With the current architectural trends, one of the major challen...
Vignesh T. Ravi, Gagan Agrawal
SIGKDD
2008
138views more  SIGKDD 2008»
14 years 10 months ago
PinKDD'08: privacy, security, and trust in KDD post workshop report
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...
165
Voted
CODASPY
2011
14 years 1 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu