Sciweavers

3651 search results - page 97 / 731
» Data Mining for Security Applications
Sort
View
121
Voted
KDD
2003
ACM
116views Data Mining» more  KDD 2003»
16 years 5 months ago
XRules: an effective structural classifier for XML data
XML documents have recently become ubiquitous because of their varied applicability in a number of applications. Classification is an important problem in the data mining domain, ...
Mohammed Javeed Zaki, Charu C. Aggarwal
PKDD
2000
Springer
108views Data Mining» more  PKDD 2000»
15 years 8 months ago
Application of Reinforcement Learning to Electrical Power System Closed-Loop Emergency Control
This paper investigates the use of reinforcement learning in electric power system emergency control. The approach consists of using numerical simulations together with on-policy M...
Christophe Druet, Damien Ernst, Louis Wehenkel
PAKDD
2005
ACM
103views Data Mining» more  PAKDD 2005»
15 years 10 months ago
Subgroup Discovery Techniques and Applications
This paper presents the advances in subgroup discovery and the ways to use subgroup discovery to generate actionable knowledge for decision support. Actionable knowledge is explici...
Nada Lavrac
IPPS
2003
IEEE
15 years 10 months ago
A Compilation Framework for Distributed Memory Parallelization of Data Mining Algorithms
With the availability of large datasets in a variety of scientific and commercial domains, data mining has emerged as an important area within the last decade. Data mining techni...
Xiaogang Li, Ruoming Jin, Gagan Agrawal
DGO
2007
192views Education» more  DGO 2007»
15 years 6 months ago
D-HOTM: distributed higher order text mining
We present D-HOTM, a framework for Distributed Higher Order Text Mining based on named entities extracted from textual data that are stored in distributed relational databases. Unl...
William M. Pottenger