Sciweavers

3651 search results - page 57 / 731
» Data Mining for Security Applications
Sort
View
107
Voted
IV
2007
IEEE
184views Visualization» more  IV 2007»
15 years 6 months ago
Visual Data Mining of Web Navigational Data
Discovering web navigational trends and understanding data mining results is undeniably advantageous to web designers and web-based application builders. It is also desirable to i...
Jiyang Chen, Tong Zheng, William Thorne, Osmar R. ...
97
Voted
ACSAC
1998
IEEE
15 years 4 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
140
Voted
KDD
2008
ACM
274views Data Mining» more  KDD 2008»
16 years 28 days ago
Data mining using high performance data clouds: experimental studies using sector and sphere
We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastruc...
Robert L. Grossman, Yunhong Gu
ACMSE
2008
ACM
15 years 2 months ago
Mining frequent sequential patterns with first-occurrence forests
In this paper, a new pattern-growth algorithm is presented to mine frequent sequential patterns using First-Occurrence Forests (FOF). This algorithm uses a simple list of pointers...
Erich Allen Peterson, Peiyi Tang
103
Voted
CCGRID
2008
IEEE
15 years 7 months ago
A Trusted Data Storage Infrastructure for Grid-Based Medical Applications
Most existing Grid technology has been foremost designed with performance and scalability in mind. When using Grid infrastructure for medical applications, privacy and security co...
Guido van 't Noordende, Sílvia Delgado Olab...