Sciweavers

2916 search results - page 142 / 584
» Generating Rule Sets from Model Trees
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
VL
1999
IEEE
109views Visual Languages» more  VL 1999»
15 years 8 months ago
Constraint-Based Diagram Beautification
Recently a new metaphor for diagramming, the intelligent diagram has emerged. This new metaphor provides an excellent basis for diagram beautification since it automatically colle...
Sitt Sen Chok, Kim Marriott, Tom Paton
EDUTAINMENT
2006
Springer
15 years 7 months ago
Generating 3D Paper-Cutting Effects
In this paper we describe a framework for generating 3D paper-cutting effects on mesh models. The framework involves the construction of model defined paper-cutting patterns, extr...
Yan Li, Jinhui Yu, Honxin Zhang, Jiaoying Shi
DMIN
2009
144views Data Mining» more  DMIN 2009»
15 years 1 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
TKDE
2008
218views more  TKDE 2008»
15 years 4 months ago
A General Model for Sequential Pattern Mining with a Progressive Database
Although there have been many recent studies on the mining of sequential patterns in a static database and in a database with increasing data, these works, in general, do not fully...
Jen-Wei Huang, Chi-Yao Tseng, Jian Chih Ou, Ming-S...