Sciweavers

2936 search results - page 295 / 588
» Genetic Process Mining
Sort
View
HAIS
2009
Springer
15 years 9 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
ICDM
2007
IEEE
131views Data Mining» more  ICDM 2007»
15 years 8 months ago
Predicting and Optimizing Classifier Utility with the Power Law
When data collection is costly and/or takes a significant amount of time, an early prediction of the classifier performance is extremely important for the design of the data minin...
Mark Last
ACSW
2004
15 years 6 months ago
Early Assessment of Classification Performance
The ability to distinguish between objects is the fundamental to learning and intelligent behavior in general. The difference between two things is the information we seek; the pr...
Bostjan Brumen, Izidor Golob, Hannu Jaakkola, Tatj...
CORR
2002
Springer
104views Education» more  CORR 2002»
15 years 4 months ago
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
In order to control the process of data mining and focus on the things of interest to us, many kinds of constraints have been added into the algorithms of data mining. However, di...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
CVPR
2006
IEEE
16 years 6 months ago
AnnoSearch: Image Auto-Annotation by Search
Although it has been studied for several years by computer vision and machine learning communities, image annotation is still far from practical. In this paper, we present AnnoSea...
Xin-Jing Wang, Lei Zhang, Feng Jing, Wei-Ying Ma