Sciweavers

2049 search results - page 204 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
ICCBR
2003
Springer
15 years 4 months ago
Case Mining from Large Databases
Abstract. This paper presents an approach of case mining to automatically discover case bases from large datasets in order to improve both the speed and the quality of case based r...
Qiang Yang, Hong Cheng
TKDE
2008
117views more  TKDE 2008»
14 years 11 months ago
Competitor Mining with the Web
This paper is concerned with the problem of mining competitors from the Web automatically. Nowadays, the fierce competition in the market necessitates every company to know not onl...
Shenghua Bao, Rui Li, Yong Yu, Yunbo Cao
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 1 days ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
ICRA
2005
IEEE
106views Robotics» more  ICRA 2005»
15 years 5 months ago
Towards Topological Exploration of Abandoned Mines
— The need for reliable maps of subterranean spaces too hazardous for humans to occupy has motivated the use of robotic technology as mapping tools. As such, we present a systemi...
Aaron Morris, David Silver, David I. Ferguson, Sco...
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
15 years 6 months ago
The Impact of Directionality in Predications on Text Mining
The number of publications in biomedicine is increasing enormously each year. To help researchers digest the information in these documents, text mining tools are being developed ...
Gondy Leroy, Marcelo Fiszman, Thomas C. Rindflesch