Sciweavers

2705 search results - page 496 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
CEC
2005
IEEE
15 years 7 months ago
Parallel evolutionary algorithms on graphics processing unit
Evolutionary Algorithms (EAs) are effective and robust methods for solving many practical problems such as feature selection, electrical circuits synthesis, and data mining. Howeve...
Man Leung Wong, Tien-Tsin Wong, Ka-Ling Fok
DEXA
2004
Springer
140views Database» more  DEXA 2004»
15 years 7 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
CSB
2002
IEEE
103views Bioinformatics» more  CSB 2002»
15 years 6 months ago
Protein-Based Analysis of Alternative Splicing in the Human Genome
Understanding the functional significance of alternative splicing and other mechanisms that generate RNA transcript diversity is an important challenge facing modern-day molecular...
Ann E. Loraine, Gregg A. Helt, Melissa S. Cline, M...
CIKM
2008
Springer
15 years 3 months ago
Metric-based ontology learning
Ontology learning is an important task in Artificial Intelligence, Semantic Web and Text Mining. This paper presents a novel framework for, and solutions to, three practical probl...
Hui Yang, Jamie Callan
113
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 1 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti