Sciweavers

3651 search results - page 54 / 731
» Data Mining for Security Applications
Sort
View
122
Voted
SOCIALCOM
2010
14 years 7 months ago
Incentive Compatible Distributed Data Mining
Abstract--In this paper, we propose a game-theoretic mechanism to encourage truthful data sharing for distributed data mining. Our proposed mechanism uses the classic VickreyClarke...
Murat Kantarcioglu, Robert Nix
104
Voted
KDD
2004
ACM
151views Data Mining» more  KDD 2004»
16 years 28 days ago
Feature selection in scientific applications
Numerous applications of data mining to scientific data involve the induction of a classification model. In many cases, the collection of data is not performed with this task in m...
Erick Cantú-Paz, Shawn Newsam, Chandrika Ka...
138
Voted
IADIS
2009
14 years 10 months ago
Proposed framework for data mining in e-learning: The case of open e-class
Web-based learning environments are extensively used nowadays. These environments maintain and produce vast amounts of data. Such vastness lead to the application of data mining t...
Ioannis Kazanidis, Stavros Valsamidis, Theodosios ...
105
Voted
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 6 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
WWW
2005
ACM
16 years 1 months ago
XAR-miner: efficient association rules mining for XML data
In this paper, we propose a framework, called XAR-Miner, for mining ARs from XML documents efficiently. In XAR-Miner, raw data in the XML document are first preprocessed to transf...
Sheng Zhang, Ji Zhang, Han Liu, Wei Wang