Sciweavers

7053 search results - page 129 / 1411
» Data Mining
Sort
View
139
Voted
SACMAT
2003
ACM
15 years 9 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
155
Voted
DAWAK
2004
Springer
15 years 9 months ago
Inductive Databases as Ranking
Abstract. Most of the research in data mining has been focused on developing novel algorithms for specific data mining tasks. However, finding the theoretical foundations of data...
Taneli Mielikäinen
157
Voted
WEBI
2009
Springer
15 years 10 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
PKDD
2005
Springer
136views Data Mining» more  PKDD 2005»
15 years 9 months ago
Weka4WS: A WSRF-Enabled Weka Toolkit for Distributed Data Mining on Grids
This paper presents Weka4WS, a framework that extends the Weka toolkit for supporting distributed data mining on Grid environments. Weka4WS adopts the emerging Web Services Resourc...
Domenico Talia, Paolo Trunfio, Oreste Verta
KDD
2001
ACM
150views Data Mining» more  KDD 2001»
15 years 8 months ago
Mining top-n local outliers in large databases
Wen Jin, Anthony K. H. Tung, Jiawei Han