Sciweavers

1512 search results - page 43 / 303
» Towards the Personalization of Algorithms Evaluation in Data...
Sort
View
APNOMS
2008
Springer
14 years 11 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
NAACL
2007
14 years 11 months ago
Extracting Appraisal Expressions
Sentiment analysis seeks to characterize opinionated or evaluative aspects of natural language text. We suggest here that appraisal expression extraction should be viewed as a fun...
Kenneth Bloom, Navendu Garg, Shlomo Argamon
TKDE
2012
253views Formal Methods» more  TKDE 2012»
13 years 4 days ago
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
—Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables and aggregating columns....
Carlos Ordonez, Zhibo Chen 0002
IJNSEC
2010
112views more  IJNSEC 2010»
14 years 4 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
PKDD
1998
Springer
123views Data Mining» more  PKDD 1998»
15 years 1 months ago
Querying Inductive Databases: A Case Study on the MINE RULE Operator
Knowledge discovery in databases (KDD) is a process that can include steps like forming the data set, data transformations, discovery of patterns, searching for exceptions to a pat...
Jean-François Boulicaut, Mika Klemettinen, ...