Sciweavers

3542 search results - page 594 / 709
» Phenomenal Data Mining: From Data to Phenomena
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 7 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ACSC
2006
IEEE
15 years 7 months ago
Unsupervised band removal leading to improved classification accuracy of hyperspectral images
Remotely-sensed images of the earth’s surface are used across a wide range of industries and applications including agriculture, mining, defence, geography and geology, to name ...
R. Ian Faulconbridge, Mark R. Pickering, Michael J...
114
Voted
PKDD
1999
Springer
106views Data Mining» more  PKDD 1999»
15 years 5 months ago
Heuristic Measures of Interestingness
When mining a large database, the number of patterns discovered can easily exceed the capabilities of a human user to identify interesting results. To address this problem, variou...
Robert J. Hilderman, Howard J. Hamilton
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
13 years 9 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
CIKM
2009
Springer
15 years 8 months ago
Agglomerating local patterns hierarchically with ALPHA
To increase the relevancy of local patterns discovered from noisy relations, it makes sense to formalize error-tolerance. Our starting point is to address the limitations of state...
Loïc Cerf, Pierre-Nicolas Mougel, Jean-Fran&c...