Sciweavers

2049 search results - page 336 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
USENIX
2001
15 years 13 days ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
IUI
2009
ACM
15 years 5 months ago
Discovering frequent work procedures from resource connections
Intelligent desktop assistants could provide more help for users if they could learn models of the users’ workflows. However, discovering desktop workflows is difficult becau...
Jianqiang Shen, Erin Fitzhenry, Thomas G. Dietteri...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 5 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
AUSDM
2007
Springer
100views Data Mining» more  AUSDM 2007»
15 years 5 months ago
An E-Market Framework to Determine the Strength of Business Relationships between Intelligent Agents
When an agent enters in an e-Market for the first time, it has no historical information that can be used to determine the strength of business relationship with participant agen...
Khandaker Shahidul Islam
KDD
2012
ACM
181views Data Mining» more  KDD 2012»
13 years 1 months ago
On "one of the few" objects
Objects with multiple numeric attributes can be compared within any “subspace” (subset of attributes). In applications such as computational journalism, users are interested i...
You Wu, Pankaj K. Agarwal, Chengkai Li, Jun Yang 0...