Sciweavers

1541 search results - page 202 / 309
» Extracting Web Data Using Instance-Based Learning
Sort
View
113
Voted
ISORC
2000
IEEE
15 years 7 months ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
140
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 9 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
146
Voted
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
16 years 3 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
135
Voted
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
15 years 1 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...
137
Voted
IEEEARES
2010
IEEE
15 years 7 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...