Sciweavers

1846 search results - page 337 / 370
» Genetic-Fuzzy Data Mining Techniques
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 9 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
DEEC
2007
IEEE
15 years 6 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 6 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
DAWAK
2007
Springer
15 years 6 months ago
MOSAIC: A Proximity Graph Approach for Agglomerative Clustering
Representative-based clustering algorithms are quite popular due to their relative high speed and because of their sound theoretical foundation. On the other hand, the clusters the...
Jiyeon Choo, Rachsuda Jiamthapthaksin, Chun-Sheng ...
UM
2007
Springer
15 years 6 months ago
Eliciting Motivation Knowledge from Log Files Towards Motivation Diagnosis for Adaptive Systems
Motivation is well-known for its importance in learning and its influence on cognitive processes. Adaptive systems would greatly benefit from having a user model of the learner’s...
Mihaela Cocea, Stephan Weibelzahl