Sciweavers

7163 search results - page 1297 / 1433
» Privacy-Preserving Data Mining
Sort
View
94
Voted
DEEC
2007
IEEE
15 years 4 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICTAI
2007
IEEE
15 years 4 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
89
Voted
DAWAK
2007
Springer
15 years 4 months ago
MOSAIC: A Proximity Graph Approach for Agglomerative Clustering
Representative-based clustering algorithms are quite popular due to their relative high speed and because of their sound theoretical foundation. On the other hand, the clusters the...
Jiyeon Choo, Rachsuda Jiamthapthaksin, Chun-Sheng ...
71
Voted
PKDD
2007
Springer
76views Data Mining» more  PKDD 2007»
15 years 4 months ago
Finding Transport Proteins in a General Protein Database
The number of specialized databases in molecular biology is growing fast, as is the availability of molecular data. These trends necessitate the development of automatic methods fo...
Sanmay Das, Milton H. Saier Jr., Charles Elkan
« Prev « First page 1297 / 1433 Last » Next »