Sciweavers

3651 search results - page 27 / 731
» Data Mining for Security Applications
Sort
View
106
Voted
AISADM
2005
Springer
15 years 3 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
82
Voted
ICDCSW
2000
IEEE
15 years 2 months ago
Adding Mobility to Non-Mobile Web Robots
In this paper we will show that it is possible to combine mobile agent technology with existing non-mobile data mining applications. The motivation for this is the advantage mobil...
Nils P. Sudmann, Dag Johansen
INCDM
2009
Springer
145views Data Mining» more  INCDM 2009»
15 years 4 months ago
Application of Classification Association Rule Mining for Mammalian Mesenchymal Stem Cell Differentiation
In this paper, data mining is used to analyze the differentiation of mammalian Mesenchymal Stem Cells (MSCs). A database comprising the key parameters which, we believe, influence ...
Weiqi Wang, Yanbo J. Wang, René Baña...
AUSDM
2007
Springer
140views Data Mining» more  AUSDM 2007»
15 years 4 months ago
The application of data mining techniques to characterize agricultural soil profiles
The advances in computing and information storage have provided vast amounts of data. The challenge has been to extract knowledge from this raw data; this has lead to new methods ...
Leisa Armstrong, Dean Diepeveen, Rowan Maddern
PAKDD
2004
ACM
117views Data Mining» more  PAKDD 2004»
15 years 3 months ago
Constraint-Based Mining of Formal Concepts in Transactional Data
We are designing new data mining techniques on boolean contexts to identify a priori interesting concepts, i.e., closed sets of objects (or transactions) and associated closed sets...
Jérémy Besson, Céline Robarde...