Sciweavers

2049 search results - page 139 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
WWW
2004
ACM
15 years 12 months ago
Visual web mining
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 5 months ago
Hierarchical Bayesian Models for Collaborative Tagging Systems
—Collaborative tagging systems with user generated content have become a fundamental element of websites such as Delicious, Flickr or CiteULike. By sharing common knowledge, mass...
Markus Bundschus, Shipeng Yu, Volker Tresp, Achim ...
ICDE
2002
IEEE
104views Database» more  ICDE 2002»
16 years 18 days ago
Efficient Evaluation of Queries with Mining Predicates
Modern relational database systems are beginning to support ad hoc queries on mining models. In this paper, we explore novel techniques for optimizing queries that apply mining mo...
Surajit Chaudhuri, Vivek R. Narasayya, Sunita Sara...
SAC
2004
ACM
15 years 4 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
15 years 11 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier