Sciweavers

132 search results - page 11 / 27
» Template detection via data mining and its applications
Sort
View
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
15 years 10 months ago
Cross domain distribution adaptation via kernel mapping
When labeled examples are limited and difficult to obtain, transfer learning employs knowledge from a source domain to improve learning accuracy in the target domain. However, the...
ErHeng Zhong, Wei Fan, Jing Peng, Kun Zhang, Jiang...
DASFAA
2005
IEEE
157views Database» more  DASFAA 2005»
15 years 3 months ago
Adaptively Detecting Aggregation Bursts in Data Streams
Finding bursts in data streams is attracting much attention in research community due to its broad applications. Existing burst detection methods suffer the problems that 1) the p...
Aoying Zhou, Shouke Qin, Weining Qian
ACSAC
2005
IEEE
15 years 3 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
JCIT
2008
165views more  JCIT 2008»
14 years 9 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
91
Voted
SDM
2011
SIAM
233views Data Mining» more  SDM 2011»
14 years 8 days ago
Distributed Monitoring of the R2 Statistic for Linear Regression
The problem of monitoring a multivariate linear regression model is relevant in studying the evolving relationship between a set of input variables (features) and one or more depe...
Kanishka Bhaduri, Kamalika Das, Chris Giannella