Sciweavers

3651 search results - page 561 / 731
» Data Mining for Security Applications
Sort
View
124
Voted
CIKM
2009
Springer
15 years 12 months ago
Agglomerating local patterns hierarchically with ALPHA
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...
Loïc Cerf, Pierre-Nicolas Mougel, Jean-Fran&c...
137
Voted
PKDD
2007
Springer
121views Data Mining» more  PKDD 2007»
15 years 11 months ago
Improved Algorithms for Univariate Discretization of Continuous Features
In discretization of a continuous variable its numerical value range is divided into a few intervals that are used in classification. For example, Na¨ıve Bayes can benefit from...
Jussi Kujala, Tapio Elomaa
MSR
2005
ACM
15 years 11 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
FSKD
2005
Springer
267views Fuzzy Logic» more  FSKD 2005»
15 years 11 months ago
Preventing Meaningless Stock Time Series Pattern Discovery by Changing Perceptually Important Point Detection
Discovery of interesting or frequently appearing time series patterns is one of the important tasks in various time series data mining applications. However, recent research critic...
Tak-Chung Fu, Fu-Lai Chung, Robert W. P. Luk, Chak...
121
Voted
VLDB
2005
ACM
79views Database» more  VLDB 2005»
15 years 10 months ago
General Purpose Database Summarization
In this paper, a message-oriented architecture for large database summarization is presented. The summarization system takes a database table as input and produces a reduced versi...
Régis Saint-Paul, Guillaume Raschia, Noured...