Sciweavers

17983 search results - page 3407 / 3597
» Set Types and Applications
Sort
View
KDD
2004
ACM
112views Data Mining» more  KDD 2004»
16 years 4 months ago
A rank sum test method for informative gene discovery
Finding informative genes from microarray data is an important research problem in bioinformatics research and applications. Most of the existing methods rank features according t...
Lin Deng, Jian Pei, Jinwen Ma, Dik Lun Lee
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 4 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
16 years 4 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
134
Voted
KDD
2002
ACM
104views Data Mining» more  KDD 2002»
16 years 4 months ago
Generalization Methods in Bioinformatics
Protein secondary structure prediction and high-throughput drug screen data mining are two important applications in bioinformatics. The data is represented in sparse feature spac...
Steven Eschrich, Nitesh V. Chawla, Lawrence O. Hal...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 4 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
« Prev « First page 3407 / 3597 Last » Next »