Sciweavers

680 search results - page 102 / 136
» Mining Frequent Itemsets Using Genetic Algorithm
Sort
View
SIGKDD
2002
81views more  SIGKDD 2002»
14 years 9 months ago
P-tree Classification of Yeast Gene Deletion Data
Genomics data has many properties that make it different from "typical" relational data. The presence of multi-valued attributes as well as the large number of null valu...
Amal Perera, Anne Denton, Pratap Kotala, William J...
CIDM
2009
IEEE
15 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
GECCO
2008
Springer
130views Optimization» more  GECCO 2008»
14 years 10 months ago
Parsimony pressure made easy
The parsimony pressure method is perhaps the simplest and most frequently used method to control bloat in genetic programming. In this paper we first reconsider the size evolutio...
Riccardo Poli, Nicholas Freitag McPhee
GECCO
2005
Springer
102views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolutionary rule-based system for IPO underpricing prediction
Academic literature has documented for a long time the existence of important price gains in the first trading day of initial public offerings (IPOs). Most of the empirical analys...
David Quintana, Cristóbal Luque del Arco-Ca...
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 1 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok