Sciweavers

3651 search results - page 562 / 731
» Data Mining for Security Applications
Sort
View
ECAI
2004
Springer
15 years 10 months ago
Exploiting Association and Correlation Rules - Parameters for Improving the K2 Algorithm
A Bayesian network is an appropriate tool to deal with the uncertainty that is typical of real-life applications. Bayesian network arcs represent statistical dependence between dif...
Evelina Lamma, Fabrizio Riguzzi, Sergio Storari
ROCAI
2004
Springer
15 years 10 months ago
Learning Interestingness Measures in Terminology Extraction. A ROC-based approach
Abstract. In the field of Text Mining, a key phase in data preparation is concerned with the extraction of terms, i.e. collocation of words attached to specific concepts (e.g. Ph...
Mathieu Roche, Jérôme Azé, Yve...
COMPSAC
1998
IEEE
15 years 9 months ago
Tools for the Knowledge Analyst: An Information Superiority Visionary Demonstration
This paper describes the application of a suite of innovative information processing and analytic support tools developed at The MITRE Corporation, in some cases as extensions of ...
Mark T. Maybury
148
Voted
COMPGEOM
1997
ACM
15 years 9 months ago
Time-Series Similarity Problems and Well-Separated Geometric Sets
Given a pair of nonidentical complex objects, de ning and determining how similar they are to each other is a nontrivial problem. In data mining applications, one frequently nee...
Béla Bollobás, Gautam Das, Dimitrios...
CBMS
2001
IEEE
15 years 9 months ago
Automated Medical Citation Records Creation for Web-Based On-Line Journals
With the rapid expansion and utilization of the Internet and Web technologies, there is an increasing number of on-line medical journals. On-line journals pose new challenges in t...
Daniel X. Le, Loc Q. Tran, Joseph Chow, Jongwoo Ki...