Sciweavers

3651 search results - page 576 / 731
» Data Mining for Security Applications
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 5 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
SDM
2009
SIAM
251views Data Mining» more  SDM 2009»
16 years 2 months ago
High Performance Parallel/Distributed Biclustering Using Barycenter Heuristic.
Biclustering refers to simultaneous clustering of objects and their features. Use of biclustering is gaining momentum in areas such as text mining, gene expression analysis and co...
Alok N. Choudhary, Arifa Nisar, Waseem Ahmad, Wei-...
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 9 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...
PKDD
2010
Springer
212views Data Mining» more  PKDD 2010»
15 years 3 months ago
Cross Validation Framework to Choose amongst Models and Datasets for Transfer Learning
Abstract. One solution to the lack of label problem is to exploit transfer learning, whereby one acquires knowledge from source-domains to improve the learning performance in the t...
ErHeng Zhong, Wei Fan, Qiang Yang, Olivier Versche...
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
14 years 21 days ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani