Sciweavers

3651 search results - page 72 / 731
» Data Mining for Security Applications
Sort
View
86
Voted
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 29 days ago
Turning CARTwheels: an alternating algorithm for mining redescriptions
We present an unusual algorithm involving classification trees-CARTwheels--where two trees are grown in opposite directions so that they are joined at their leaves. This approach ...
Naren Ramakrishnan, Deept Kumar, Bud Mishra, Malco...
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 9 days ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
116
Voted
IPPS
2008
IEEE
15 years 7 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
134
Voted
IAT
2006
IEEE
15 years 6 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
KDD
2008
ACM
121views Data Mining» more  KDD 2008»
16 years 29 days ago
Reconstructing chemical reaction networks: data mining meets system identification
We present an approach to reconstructing chemical reaction networks from time series measurements of the concentrations of the molecules involved. Our solution strategy combines t...
Yong Ju Cho, Naren Ramakrishnan, Yang Cao