Sciweavers

1701 search results - page 113 / 341
» Providing k-anonymity in data mining
Sort
View
WWW
2006
ACM
15 years 10 months ago
A content and structure website mining model
We present a novel model for validating and improving the content and structure organization of a website. This model studies the website as a graph and evaluates its interconnect...
Barbara Poblete, Ricardo A. Baeza-Yates
ADMI
2009
Springer
15 years 4 months ago
A Sequence Mining Method to Predict the Bidding Strategy of Trading Agents
Abstract. In this work, we describe the process used in order to predict the bidding strategy of trading agents. This was done in the context of the Reverse TAC, or CAT, game of th...
Vivia Nikolaidou, Pericles A. Mitkas
ICNSC
2008
IEEE
15 years 4 months ago
Mining the Royal Portrait Miniature for the Art Historical Context
— the eleventh-century royal portrait miniature painting of King Gagik-Abas of Kars, Queen Goranduxt, and Princess Marem is an important image within the realm of Armenian art hi...
Steve Read, Yu Cao, Hazel Antaramian-Hofman
IWPC
2006
IEEE
15 years 4 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...