Sciweavers

479 search results - page 35 / 96
» Intrusion Detection Based on Data Mining
Sort
View
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 7 days ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 4 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
VLDB
2007
ACM
179views Database» more  VLDB 2007»
16 years 2 days ago
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data
Market analysis is a representative data analysis process with many applications. In such an analysis, critical numerical measures, such as profit and sales, fluctuate over time a...
Xiaolei Li, Jiawei Han
IAT
2006
IEEE
15 years 5 months ago
A Web-Based System to Monitor the Quality of Meta-Data in Web Portals
We present a web-based system to monitor the quality of the meta-data used to describe content in web portals. The system implements meta-data analysis using statistical, visualiz...
Marcos Aurélio Domingues, Carlos Soares, Al...
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
15 years 3 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto