Sciweavers

2049 search results - page 109 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
CORR
2000
Springer
230views Education» more  CORR 2000»
14 years 11 months ago
Integrating E-Commerce and Data Mining: Architecture and Challenges
We show that the e-commerce domain can provide all the right ingredients for successful data mining. We describe an integrated architecture for supporting this integration. The ar...
Suhail Ansari, Ron Kohavi, Llew Mason, Zijian Zhen...
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
15 years 11 months ago
Data Mining for Typhoon Image Collection
This paper introduces the application of data mining methods to the analysis and prediction of the typhoon. The testbed for this research is the typhoon image collection that we e...
Asanobu Kitamoto
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 3 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 5 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
KDD
2003
ACM
162views Data Mining» more  KDD 2003»
15 years 11 months ago
Improving spatial locality of programs via data mining
In most computer systems, page fault rate is currently minimized by generic page replacement algorithms which try to model the temporal locality inherent in programs. In this pape...
Karlton Sequeira, Mohammed Javeed Zaki, Boleslaw K...