Sciweavers

479 search results - page 29 / 96
» Intrusion Detection Based on Data Mining
Sort
View
ICDM
2007
IEEE
140views Data Mining» more  ICDM 2007»
15 years 3 months ago
Sequential Change Detection on Data Streams
Model-based declarative queries are becoming an attractive paradigm for interacting with many data stream applications. This has led to the development of techniques to accurately...
S. Muthukrishnan, Eric van den Berg, Yihua Wu
IJON
2006
146views more  IJON 2006»
14 years 12 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
PAKDD
2004
ACM
94views Data Mining» more  PAKDD 2004»
15 years 5 months ago
Self-Similar Mining of Time Association Rules
Although the task of mining association rules has received considerable attention in the literature, algorithms to find time association rules are often inadequate, by either miss...
Daniel Barbará, Ping Chen, Zohreh Nazeri
PAKDD
2005
ACM
146views Data Mining» more  PAKDD 2005»
15 years 5 months ago
An Incremental Data Stream Clustering Algorithm Based on Dense Units Detection
Abstract. The data stream model of computation is often used for analyzing huge volumes of continuously arriving data. In this paper, we present a novel algorithm called DUCstream ...
Jing Gao, Jianzhong Li, Zhaogong Zhang, Pang-Ning ...
SACMAT
2003
ACM
15 years 5 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf