Sciweavers

3651 search results - page 82 / 731
» Data Mining for Security Applications
Sort
View
113
Voted
VTC
2010
IEEE
114views Communications» more  VTC 2010»
14 years 10 months ago
A Secure Multi-Application Platform for Vehicle Telematics
Contemporary vehicles offer an advanced telematics platform with multiple applications available such as electronic road tolling, emergency call, breakdown call, or route planning....
Jef Maerien, Sam Michiels, Stefan Van Baelen, Chri...
98
Voted
MIE
2008
112views Healthcare» more  MIE 2008»
15 years 2 months ago
Mining Knowledge from Corpora: an Application to Retrieval and Indexing
The present work aims at discovering new associations between medical concepts to be exploited as input in retrieval and indexing. Material and Methods: Association rules method is...
Lina Fatima Soualmia, Badisse Dahamna, Stéf...
137
Voted
IJSI
2008
129views more  IJSI 2008»
15 years 18 days ago
Managing the Acronym/Expansion Identification Process for Text-Mining Applications
This paper deals with an acronym/definition extraction approach from textual data (corpora) and the disambiguation of these definitions (or expansions). Both steps of our global pr...
Mathieu Roche, Violaine Prince
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 22 days ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
72
Voted
KDD
2000
ACM
82views Data Mining» more  KDD 2000»
15 years 4 months ago
Exploration mining in diabetic patients databases: findings and conclusions
Real-life data mining applications are interesting because they often present a different set of problems for data miners. One such real-life application that we have done is on t...
Wynne Hsu, Mong-Li Lee, Bing Liu, Tok Wang Ling