Sciweavers

3651 search results - page 55 / 731
» Data Mining for Security Applications
Sort
View
116
Voted
AUSDM
2006
Springer
177views Data Mining» more  AUSDM 2006»
15 years 4 months ago
On The Optimal Working Set Size in Serial and Parallel Support Vector Machine Learning With The Decomposition Algorithm
The support vector machine (SVM) is a wellestablished and accurate supervised learning method for the classification of data in various application fields. The statistical learnin...
Tatjana Eitrich, Bruno Lang
81
Voted
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
16 years 28 days ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...
AUSDM
2006
Springer
110views Data Mining» more  AUSDM 2006»
15 years 4 months ago
Discovering Debtor Patterns of Centrelink Customers
Data mining is currently becoming an increasingly hot research field, but a large gap still remains between the research of data mining and its application in real-world business....
Yanchang Zhao, Longbing Cao, Yvonne Morrow, Yuming...
ESWA
2007
178views more  ESWA 2007»
15 years 14 days ago
Educational data mining: A survey from 1995 to 2005
ct 7 Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing 8 research community. This paper surveys the ...
Cristóbal Romero, Sebastián Ventura
EDBT
2008
ACM
206views Database» more  EDBT 2008»
16 years 20 days ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo