Sciweavers

773 search results - page 77 / 155
» Mining taxonomies of process models
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 8 days ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
DASFAA
2011
IEEE
270views Database» more  DASFAA 2011»
14 years 3 months ago
AutoBayesian: Developing Bayesian Networks Based on Text Mining
Bayesian network is a widely used tool for data analysis, modeling and decision support in various domains. There is a growing need for techniques and tools which can automatically...
Sandeep Raghuram, Yuni Xia, Jiaqi Ge, Mathew Palak...
GIS
2008
ACM
16 years 29 days ago
GEDMWA: geospatial exploratory data mining web agent
An abundance of geospatial information is flourishing on the Internet but mining and disseminating these data is a daunting task. With anything published on the web available to t...
Edward Pultar, Martin Raubal, Michael F. Goodchild
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 2 months ago
Mining emerging patterns by streaming feature selection
Building an accurate emerging pattern classifier with a highdimensional dataset is a challenging issue. The problem becomes even more difficult if the whole feature space is unava...
Kui Yu, Wei Ding 0003, Dan A. Simovici, Xindong Wu
WWW
2006
ACM
16 years 16 days ago
Mining related queries from search engine query logs
In this work we propose a method that retrieves a list of related queries given an initial input query. The related queries are based on the query log of previously issued queries...
Xiaodong Shi, Christopher C. Yang