Sciweavers

3651 search results - page 77 / 731
» Data Mining for Security Applications
Sort
View
VLDB
1998
ACM
103views Database» more  VLDB 1998»
15 years 8 months ago
The Drill Down Benchmark
Data Mining places specific requirements on DBMS query performance that cannot be evaluated satisfactorily using existing OLAP benchmarks. The DD Benchmark - defined here - provid...
Peter A. Boncz, Tim Rühl, Fred Kwakkel
AUSAI
2007
Springer
15 years 10 months ago
Merging Algorithm to Reduce Dimensionality in Application to Web-Mining
Dimensional reduction may be effective in order to compress data without loss of essential information. Also, it may be useful in order to smooth data and reduce random noise. The...
Vladimir Nikulin, Geoffrey J. McLachlan
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 4 months ago
Constraint programming for itemset mining
The relationship between constraint-based mining and constraint programming is explored by showing how the typical constraints used in pattern mining can be formulated for use in ...
Luc De Raedt, Tias Guns, Siegfried Nijssen
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 4 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
ACSAC
2001
IEEE
15 years 8 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch