Sciweavers

3651 search results - page 98 / 731
» Data Mining for Security Applications
Sort
View
131
Voted
JIIS
2002
130views more  JIIS 2002»
15 years 4 months ago
Image Mining: Trends and Developments
Advances in image acquisition and storage technology have led to tremendous growth in very large and detailed image databases. These images, if analyzed, can reveal useful informa...
Wynne Hsu, Mong-Li Lee, Ji Zhang
122
Voted
KYOTODL
2000
140views more  KYOTODL 2000»
15 years 6 months ago
Text Data Mining: Discovery of Important Keywords in the Cyberspace
This paper describes applications of the optimized pattern discover),framework to text and Webmining. In particular; we introduce a class of simple combinatorialpatterns over phra...
Hiroki Arimura, Jun-ichiro Abe, Hiroshi Sakamoto, ...
DEXA
2006
Springer
102views Database» more  DEXA 2006»
15 years 8 months ago
Mining RDF Metadata for Generalized Association Rules
In this paper, we present a novel frequent generalized pattern mining algorithm, called GP-Close, for mining generalized associations from RDF metadata. To solve the overgeneraliz...
Tao Jiang, Ah-Hwee Tan
131
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 11 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 5 months ago
Mining data records in Web pages
A large amount of information on the Web is contained in regularly structured objects, which we call data records. Such data records are important because they often present the e...
Bing Liu, Robert L. Grossman, Yanhong Zhai