Sciweavers

3651 search results - page 60 / 731
» Data Mining for Security Applications
Sort
View
SEKE
2005
Springer
15 years 6 months ago
From Data to Knowledge: an Integrated Rule-Based Data Mining System
This paper presents an integrated rule-based data mining system that is capable of creating rulebased classifiers with web-based user interface from data sets provided by end user...
Chien-Chung Chan, Zhicheng Su
SIGKDD
2008
149views more  SIGKDD 2008»
15 years 14 days ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
97
Voted
ECEH
2006
144views Healthcare» more  ECEH 2006»
15 years 1 months ago
Process Based Data Logistics: Data Integration for Healthcare Applications
Data integration in medical applications is a crucial and sensitive task. It turns out that there are rigid factors like heterogeneous, distributed data sources, security, and comp...
Stefan Jablonski
ICISC
2009
146views Cryptology» more  ICISC 2009»
14 years 10 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
IJNSEC
2010
112views more  IJNSEC 2010»
14 years 7 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré