Sciweavers

3651 search results - page 545 / 731
» Data Mining for Security Applications
Sort
View
ECML
2007
Springer
15 years 9 months ago
Finding Composite Episodes
Mining frequent patterns is a major topic in data mining research, resulting in many seminal papers and algorithms on item set and episode discovery. The combination of these, call...
Ronnie Bathoorn, Arno Siebes
DAWAK
2008
Springer
15 years 7 months ago
Document-Base Extraction for Single-Label Text Classification
Many text mining applications, especially when investigating Text Classification (TC), require experiments to be performed using common textcollections, such that results can be co...
Yanbo J. Wang, Robert Sanderson, Frans Coenen, Pau...
158
Voted
DGO
2009
88views Education» more  DGO 2009»
15 years 6 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...
CORR
2010
Springer
150views Education» more  CORR 2010»
15 years 5 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
145
Voted
CORR
2008
Springer
105views Education» more  CORR 2008»
15 years 5 months ago
Robust Machine Learning Applied to Terascale Astronomical Datasets
We present recent results from the LCDM3 collaboration between UIUC Astronomy and NCSA to deploy supercomputing cluster resources and machine learning algorithms for the mining of ...
Nicholas M. Ball, Robert J. Brunner, Adam D. Myers