Sciweavers

3651 search results - page 564 / 731
» Data Mining for Security Applications
Sort
View
CORR
2010
Springer
200views Education» more  CORR 2010»
15 years 5 months ago
A Multilevel Approach For Nonnegative Matrix Factorization
Nonnegative Matrix Factorization (NMF) is the problem of approximating a nonnegative matrix with the product of two low-rank nonnegative matrices and has been shown to be particul...
Nicolas Gillis, François Glineur
128
Voted
ESWA
2008
101views more  ESWA 2008»
15 years 5 months ago
Discovering during-temporal patterns (DTPs) in large temporal databases
Abstract Large temporal Databases (TDBs) usually contain a wealth of data about temporal events. Aimed at discovering temporal patterns with during relationship (during-temporal pa...
Li Zhang, Guoqing Chen, Tom Brijs, Xing Zhang
DKE
2007
95views more  DKE 2007»
15 years 5 months ago
Strategies for improving the modeling and interpretability of Bayesian networks
One of the main factors for the knowledge discovery success is related to the comprehensibility of the patterns discovered by applying data mining techniques. Amongst which we can...
Ádamo L. de Santana, Carlos Renato Lisboa F...
ELECTRONICMARKETS
2000
130views more  ELECTRONICMARKETS 2000»
15 years 5 months ago
Virtual Communities of Transaction: The Role of Personalization in Electronic Commerce
Bringing communities of buyers and sellers together in the arena of electronic commerce stimulates three major potentials: the building of trust, the collection and effective use ...
Petra Schubert, Mark Ginsburg
TODS
2002
92views more  TODS 2002»
15 years 4 months ago
Searching in metric spaces with user-defined and approximate distances
Metric access methods (MAMs), such as the M-tree, are powerful index structures for supporting ty queries on metric spaces, which represent a common abstraction for those searchin...
Paolo Ciaccia, Marco Patella