Sciweavers

3651 search results - page 74 / 731
» Data Mining for Security Applications
Sort
View
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 5 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
15 years 9 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
116
Voted
KDD
2007
ACM
211views Data Mining» more  KDD 2007»
16 years 1 months ago
Enhanced max margin learning on multimodal data mining in a multimedia database
The problem of multimodal data mining in a multimedia database can be addressed as a structured prediction problem where we learn the mapping from an input to the structured and i...
Zhen Guo, Zhongfei Zhang, Eric P. Xing, Christos F...
95
Voted
KDD
2000
ACM
168views Data Mining» more  KDD 2000»
15 years 4 months ago
Scaling up dynamic time warping for datamining applications
There has been much recent interest in adapting data mining algorithms to time series databases. Most of these algorithms need to compare time series. Typically some variation of ...
Eamonn J. Keogh, Michael J. Pazzani
80
Voted
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 1 months ago
Augmenting the generalized hough transform to enable the mining of petroglyphs
Rock art is an archaeological term for human-made markings on stone. It is believed that there are millions of petroglyphs in North America alone, and the study of this valued cul...
Eamonn J. Keogh, Qiang Zhu 0002, Sang-Hee Lee, Xia...