Sciweavers

2049 search results - page 282 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 11 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
HICSS
2011
IEEE
261views Biometrics» more  HICSS 2011»
14 years 3 months ago
Improved Patient Outcomes through Collaborative Monitoring and Management of Subtle Behavioral and Physiological Health Changes
This paper describes a highly mobile collaborative patient-centric, self-monitoring, symptom recognition and self intervention system along with a complementary clinical nursing t...
Paul J. Fortier, Brendon Puntin, Osama Aljaroudi
KDD
2009
ACM
143views Data Mining» more  KDD 2009»
15 years 11 months ago
Optimizing web traffic via the media scheduling problem
Website traffic varies through time in consistent and predictable ways, with highest traffic in the middle of the day. When providing media content to visitors, it is important to...
Lars Backstrom, Jon M. Kleinberg, Ravi Kumar
ICDM
2007
IEEE
157views Data Mining» more  ICDM 2007»
15 years 5 months ago
Failure Prediction in IBM BlueGene/L Event Logs
Frequent failures are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in size and compl...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
KDD
2010
ACM
282views Data Mining» more  KDD 2010»
15 years 3 months ago
Optimizing debt collections using constrained reinforcement learning
In this paper, we propose and develop a novel approach to the problem of optimally managing the tax, and more generally debt, collections processes at financial institutions. Our...
Naoki Abe, Prem Melville, Cezar Pendus, Chandan K....