Sciweavers

3651 search results - page 602 / 731
» Data Mining for Security Applications
Sort
View
SOCO
2008
Springer
14 years 11 months ago
Tabu search for attribute reduction in rough set theory
Attribute reduction of an information system is a key problem in rough set theory and its applications. Using computational intelligence (CI) tools to solve such problems has rece...
Abdel-Rahman Hedar, Jue Wang, Masao Fukushima
WWW
2011
ACM
14 years 6 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
WWW
2004
ACM
15 years 11 months ago
Similarity spreading: a unified framework for similarity calculation of interrelated objects
In many Web search applications, similarities between objects of one type (say, queries) can be affected by the similarities between their interrelated objects of another type (sa...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
SSDBM
2005
IEEE
184views Database» more  SSDBM 2005»
15 years 4 months ago
Optimizing Multiple Top-K Queries over Joins
Advanced Data Mining applications require more and more support from relational database engines. Especially clustering applications in high dimensional features space demand a pr...
Dirk Habich, Wolfgang Lehner, Alexander Hinneburg
DOLAP
2004
ACM
15 years 4 months ago
Developing a characterization of business intelligence workloads for sizing new database systems
Computer system sizing involves estimating the amount of hardware resources needed to support a new workload not yet deployed in a production environment. In order to determine th...
Ted J. Wasserman, Patrick Martin, David B. Skillic...