Sciweavers

3651 search results - page 46 / 731
» Data Mining for Security Applications
Sort
View
TITB
2008
204views more  TITB 2008»
14 years 12 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
103
Voted
JDCTA
2010
122views more  JDCTA 2010»
14 years 7 months ago
The Application Research of High-dimensional Mixed-attribute Data Clustering Algorithm
High-dimensional mixed-attribute data clustering has become an important research direction in data mining area. Because of the advantages of the information technology, data coll...
Lilin Fan, Chunhong Liu, Qian Liu
137
Voted
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 2 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
CE
2008
160views more  CE 2008»
15 years 18 days ago
Data mining in course management systems: Moodle case study and tutorial
Educational data mining is an emerging discipline, concerned with developing methods for exploring the unique types of data that come from the educational context. This work is a ...
Cristóbal Romero, Sebastián Ventura,...
PAKDD
2005
ACM
117views Data Mining» more  PAKDD 2005»
15 years 6 months ago
Automatic View Selection: An Application to Image Mining
Abstract. In this paper we discuss an image mining application of Egeria detection. Egeria is a type of weed found in various lands and water regions over San Joaquin and Sacrament...
Manoranjan Dash, Deepak Kolippakkam