Sciweavers

7163 search results - page 1324 / 1433
» Privacy-Preserving Data Mining
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
15 years 7 months ago
Hierarchical Linear Discriminant Analysis for Beamforming.
This paper demonstrates the applicability of the recently proposed supervised dimension reduction, hierarchical linear discriminant analysis (h-LDA) to a well-known spatial locali...
Barry L. Drake, Haesun Park, Jaegul Choo
SAC
2009
ACM
15 years 4 months ago
Applying latent dirichlet allocation to group discovery in large graphs
This paper introduces LDA-G, a scalable Bayesian approach to finding latent group structures in large real-world graph data. Existing Bayesian approaches for group discovery (suc...
Keith Henderson, Tina Eliassi-Rad
INTERACTION
2009
ACM
15 years 4 months ago
Temporal-spatial association analysis of ocean salinity and temperature variations
Ocean circulation plays an important role in global climate change. In an effort to monitor ocean circulation an infrastructure of more than 3,000 buoys have been deployed in the ...
Yo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes
SCAM
2007
IEEE
15 years 4 months ago
A Framework for Studying Clones In Large Software Systems
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the ...
Zhen Ming Jiang, Ahmed E. Hassan
« Prev « First page 1324 / 1433 Last » Next »