Sciweavers

7387 search results - page 312 / 1478
» Knowledge-based data mining
Sort
View
148
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
127
Voted
ER
2007
Springer
128views Database» more  ER 2007»
15 years 9 months ago
Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering
The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
Luis Otávio Alvares, Vania Bogorny, Jos&eac...
150
Voted
VLDB
2004
ACM
115views Database» more  VLDB 2004»
15 years 8 months ago
Semantic Mining and Analysis of Gene Expression Data
Association rules can reveal biological relevant relationship between genes and environments / categories. However, most existing association rule mining algorithms are rendered i...
Xin Xu, Gao Cong, Beng Chin Ooi, Kian-Lee Tan, Ant...
124
Voted
RIDE
1997
IEEE
15 years 7 months ago
Evaluation of Sampling for Data Mining of Association Rules
Discovery of association rules is a prototypical problem in data mining. The current algorithms proposed for data mining of association rules make repeated passes over the databas...
Mohammed Javeed Zaki, Srinivasan Parthasarathy, We...
HIS
2003
15 years 4 months ago
Data Mining of Web Access Logs From an Academic Web Site
We have used a general purpose data mining tool to determine whether we can find any ‘golden nuggets’ in the web access logs of a large academic web site. Our goal was to use...
Victor Ciesielski, A. Lalani