Sciweavers

3651 search results - page 62 / 731
» Data Mining for Security Applications
Sort
View
CCGRID
2006
IEEE
15 years 6 months ago
SAHA: A Scheduling Algorithm for Security-Sensitive Jobs on Data Grids
Security-sensitive applications that access and generate large data sets are emerging in various areas such as bioinformatics and high energy physics. Data grids provide data-inte...
Tao Xie 0004, Xiao Qin
122
Voted
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
15 years 4 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
118
Voted
KDD
2008
ACM
192views Data Mining» more  KDD 2008»
16 years 29 days ago
Partial least squares regression for graph mining
Attributed graphs are increasingly more common in many application domains such as chemistry, biology and text processing. A central issue in graph mining is how to collect inform...
Hiroto Saigo, Koji Tsuda, Nicole Krämer
133
Voted
JUCS
2008
125views more  JUCS 2008»
15 years 15 days ago
Improving AEH Courses through Log Analysis
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
César Vialardi Sacín, Javier Bravo, ...
131
Voted
HIPC
1999
Springer
15 years 4 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava