Sciweavers

3651 search results - page 76 / 731
» Data Mining for Security Applications
Sort
View
KDD
2006
ACM
118views Data Mining» more  KDD 2006»
16 years 1 months ago
Maximum profit mining and its application in software development
While most software defects (i.e., bugs) are corrected and tested as part of the lengthy software development cycle, enterprise software vendors often have to release software pro...
Charles X. Ling, Victor S. Sheng, Tilmann F. W. Br...
102
Voted
ICDM
2007
IEEE
175views Data Mining» more  ICDM 2007»
15 years 7 months ago
gApprox: Mining Frequent Approximate Patterns from a Massive Network
Recently, there arise a large number of graphs with massive sizes and complex structures in many new applications, such as biological networks, social networks, and the Web, deman...
Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han
IADIS
2008
15 years 2 months ago
KDD, SEMMA and CRISP-DM: a parallel overview
In the last years there has been a huge growth and consolidation of the Data Mining field. Some efforts are being done that seek the establishment of standards in the area. Includ...
Ana Azevedo, Manuel Filipe Santos
113
Voted
ACSW
2004
15 years 2 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic
109
Voted
CORR
2011
Springer
173views Education» more  CORR 2011»
14 years 7 months ago
U-Sem: Semantic Enrichment, User Modeling and Mining of Usage Data on the Social Web
With the growing popularity of Social Web applications, more and more user data is published on the Web everyday. Our research focuses on investigating ways of mining data from su...
Fabian Abel, Ilknur Celik, Claudia Hauff, Laura Ho...