Sciweavers

3651 search results - page 83 / 731
» Data Mining for Security Applications
Sort
View
179
Voted
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
16 years 22 days ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
120
Voted
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 6 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
85
Voted
EUSFLAT
2007
186views Fuzzy Logic» more  EUSFLAT 2007»
15 years 2 months ago
Forest of Fuzzy Decision Trees and Their Application in Video Mining
One of the great challenges today is to index videos with high-level semantic concepts or features. The basis of our approach is to use a fuzzy decision trees (FDT) to construct t...
Marcin Detyniecki, Christophe Marsala
KDD
2010
ACM
161views Data Mining» more  KDD 2010»
15 years 2 months ago
Mass estimation and its applications
This paper introduces mass estimation—a base modelling mechanism in data mining. It provides the theoretical basis of mass and an efficient method to estimate mass. We show that...
Kai Ming Ting, Guang-Tong Zhou, Fei Tony Liu, Jame...
107
Voted
CIKM
2009
Springer
15 years 7 months ago
Frequent subgraph pattern mining on uncertain graph data
Graph data are subject to uncertainties in many applications due to incompleteness and imprecision of data. Mining uncertain graph data is semantically different from and computat...
Zhaonian Zou, Jianzhong Li, Hong Gao, Shuo Zhang