Sciweavers

395 search results - page 32 / 79
» Visually Controllable Data Mining Methods
Sort
View
IEEEARES
2010
IEEE
15 years 7 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
CCS
2009
ACM
15 years 8 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
15 years 8 months ago
Unsupervised Face Annotation by Mining the Web
Searching for images of people is an essential task for image and video search engines. However, current search engines have limited capabilities for this task since they rely on ...
Duy-Dinh Le, Shin'ichi Satoh
CORR
2004
Springer
218views Education» more  CORR 2004»
15 years 1 months ago
A Dynamic Clustering-Based Markov Model for Web Usage Mining
Markov models have been widely utilized for modelling user web navigation behaviour. In this work we propose a dynamic clustering-based method to increase a Markov model's ac...
José Borges, Mark Levene
MIE
2008
119views Healthcare» more  MIE 2008»
15 years 3 months ago
Using Knowledge for Indexing Health Web Resources in a Quality-Controlled Gateway
Objectives: The aim of this study is to provide to indexers MeSH terms to be considered as major ones in a list of terms automatically extracted from a document. Material and metho...
Michel Joubert, Stéfan Jacques Darmoni, Pau...