Sciweavers

2065 search results - page 325 / 413
» Techniques of Cluster Algorithms in Data Mining
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 8 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
KDD
1999
ACM
185views Data Mining» more  KDD 1999»
15 years 6 months ago
Visual Classification: An Interactive Approach to Decision Tree Construction
Satisfying the basic requirements of accuracy and understandability of a classifier, decision tree classifiers have become very popular. Instead of constructing the decision tree ...
Mihael Ankerst, Christian Elsen, Martin Ester, Han...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 4 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
EDBT
2009
ACM
90views Database» more  EDBT 2009»
15 years 8 months ago
Privacy-preserving data mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers ...
Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patr...
DMIN
2006
111views Data Mining» more  DMIN 2006»
15 years 3 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel