Sciweavers

2049 search results - page 114 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
85
Voted
VRML
2004
ACM
15 years 4 months ago
Interactive Web-based visualisation of block model data
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
Tony Gill, Con Caris, Guy LeBlanc Smith
RAID
1999
Springer
15 years 3 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
KDD
1995
ACM
139views Data Mining» more  KDD 1995»
15 years 2 months ago
Resource and Knowledge Discovery in Global Information Systems: A Preliminary Design and Experiment
Eficient and efiective discovery of resource and knowledge from the Internet has become an imminent research issue, especially with the advent of the Information Super-Highway. A ...
Osmar R. Zaïane, Jiawei Han
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
15 years 11 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 3 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...