Sciweavers

92 search results - page 4 / 19
» Evaluating generalized association rules through objective m...
Sort
View
106
Voted
CODES
2005
IEEE
15 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
KDD
2005
ACM
163views Data Mining» more  KDD 2005»
15 years 2 months ago
Web mining from competitors' websites
This paper presents a framework for user-oriented text mining. It is then illustrated with an example of discovering knowledge from competitors’ websites. The knowledge to be di...
Xin Chen, Yi-fang Brook Wu
DAM
2008
83views more  DAM 2008»
14 years 9 months ago
Multi-group support vector machines with measurement costs: A biobjective approach
Support Vector Machine has shown to have good performance in many practical classification settings. In this paper we propose, for multi-group classification, a biobjective optimi...
Emilio Carrizosa, Belen Martin-Barragan, Dolores R...
PKDD
2001
Springer
185views Data Mining» more  PKDD 2001»
15 years 1 months ago
Temporal Rule Discovery for Time-Series Satellite Images and Integration with RDB
Feature extraction and knowledge discovery from a large amount of image data such as remote sensing images have become highly required recent years. In this study, a framework for ...
Rie Honda, Osamu Konishi
BMCBI
2004
114views more  BMCBI 2004»
14 years 9 months ago
Extending the mutual information measure to rank inferred literature relationships
Background: Within the peer-reviewed literature, associations between two things are not always recognized until commonalities between them become apparent. These commonalities ca...
Jonathan D. Wren