Sciweavers

1347 search results - page 106 / 270
» Using Clustering Methods for Discovering Event Structures
Sort
View
145
Voted
JCS
2011
138views more  JCS 2011»
14 years 6 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
121
Voted
CANDC
2009
ACM
15 years 10 months ago
A quantitative analysis of the collective creativity in playing 20-questions games
Creativity is an important ingredient in problem solving, and problem solving is an important activity for both individuals and societies. This paper discusses our novel approach ...
Wen Dong, Taemie Kim, Alex Pentland
133
Voted
ICDM
2010
IEEE
127views Data Mining» more  ICDM 2010»
15 years 1 months ago
Learning Markov Network Structure with Decision Trees
Traditional Markov network structure learning algorithms perform a search for globally useful features. However, these algorithms are often slow and prone to finding local optima d...
Daniel Lowd, Jesse Davis
137
Voted
DEBS
2010
ACM
14 years 10 months ago
Distributed structural and value XML filtering
Many XML filtering systems have emerged in recent years identifying XML data that structurally match XPath queries in an efficient way. However, apart from structural matching, it...
Iris Miliaraki, Manolis Koubarakis
256
Voted
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 3 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...