Sciweavers

1552 search results - page 52 / 311
» Mining for Patterns in Contradictory Data
Sort
View
ACSAC
2006
IEEE
15 years 11 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 8 months ago
Harnessing the wisdom of the crowds for accurate web page clipping
Clipping Web pages, namely extracting the informative clips (areas) from Web pages, has many applications, such as Web printing and e-reading on small handheld devices. Although m...
Lei Zhang, Linpeng Tang, Ping Luo, Enhong Chen, Li...
WEBI
2009
Springer
16 years 2 days ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
KDD
2012
ACM
185views Data Mining» more  KDD 2012»
13 years 8 months ago
A framework for summarizing and analyzing twitter feeds
The firehose of data generated by users on social networking and microblogging sites such as Facebook and Twitter is enormous. Real-time analytics on such data is challenging wit...
Xintian Yang, Amol Ghoting, Yiye Ruan, Srinivasan ...
IDA
2005
Springer
15 years 11 months ago
From Local Pattern Mining to Relevant Bi-cluster Characterization
Clustering or bi-clustering techniques have been proved quite useful in many application domains. A weakness of these techniques remains the poor support for grouping characterizat...
Ruggero G. Pensa, Jean-François Boulicaut