Sciweavers

780 search results - page 80 / 156
» Reasoning about sets using redescription mining
Sort
View
ACSAC
2009
IEEE
15 years 7 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
100
Voted
SDM
2009
SIAM
157views Data Mining» more  SDM 2009»
15 years 10 months ago
MUSK: Uniform Sampling of k Maximal Patterns.
Recent research in frequent pattern mining (FPM) has shifted from obtaining the complete set of frequent patterns to generating only a representative (summary) subset of frequent ...
Mohammad Al Hasan, Mohammed Javeed Zaki
100
Voted
P2P
2006
IEEE
118views Communications» more  P2P 2006»
15 years 6 months ago
Conjunction Dysfunction: The Weakness of Conjunctive Queries in Peer-to-Peer File-sharing Systems
Peers in peer-to-peer file-sharing systems use conjunctive queries as a way of controlling query cost in the absence of information about the behavior of other peers. Conjunctive ...
Wai Gen Yee, Linh Thai Nguyen, Ophir Frieder
ECOOPW
1994
Springer
15 years 4 months ago
Requirements for a Composition Language
A composition language based on a formal semantic foundation will facilitate precification of glue abstractions and compositions, and will support reasoning about their behaviour....
Oscar Nierstrasz, Theo Dirk Meijler
114
Voted
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 7 months ago
Spatio-temporal Multi-dimensional Relational Framework Trees
—The real world is composed of sets of objects that move and morph in both space and time. Useful concepts can be defined in terms of the complex interactions between the multi-...
Matthew Bodenhamer, Samuel Bleckley, Daniel Fennel...