Sciweavers

479 search results - page 87 / 96
» Intrusion Detection Based on Data Mining
Sort
View
VLDB
2004
ACM
111views Database» more  VLDB 2004»
15 years 5 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
ALMOB
2008
112views more  ALMOB 2008»
14 years 12 months ago
Metabolite-based clustering and visualization of mass spectrometry data using one-dimensional self-organizing maps
Background: One of the goals of global metabolomic analysis is to identify metabolic markers that are hidden within a large background of data originating from high-throughput ana...
Peter Meinicke, Thomas Lingner, Alexander Kaever, ...
JMLR
2006
132views more  JMLR 2006»
14 years 11 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
CIKM
2010
Springer
14 years 10 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
KDD
2007
ACM
220views Data Mining» more  KDD 2007»
16 years 4 days ago
SCAN: a structural clustering algorithm for networks
Network clustering (or graph partitioning) is an important task for the discovery of underlying structures in networks. Many algorithms find clusters by maximizing the number of i...
Xiaowei Xu, Nurcan Yuruk, Zhidan Feng, Thomas A. J...