A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Visual Data Mining
2002
SIGKDD Explorations
a one-day workshop on Visual Data Mining was held in conjunction with the KDD-2001 conference. About 50 people attended the workshop, mostly from industry with some academics. ...
The audience included both data mining algorithm experts and visualization specialists. ...
The approaches considered addressed dimensional scalability, reducing data sizes via algorithms, and packing more information into the visual presentation by exploiting pixel-based techniques. ...
doi:10.1145/507515.507526
fatcat:g7tp26a275epviswbfuhxdqrhm
An Overview of Interaction Techniques and 3D Representations for Data Mining
[chapter]
2012
Applications of Virtual Reality
In addition, we survey representative works on the use of 3D and VR interaction techniques in the context of KDD. Finally, we present possible directions for future research. ...
In Section 4, we provide an overview of the current state of research concerning 3D visual representations. In Section 5, we present our motivation for interaction techniques in the context of KDD. ...
An Overview of Interaction Techniques and 3D Representations for Data Mining, Applications of Virtual Reality, Dr. ...
doi:10.5772/37263
fatcat:ohd4wsmwbjgc7avdhxnbqe2bne
Developing an open knowledge discovery support system for a network environment
2005
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.
, can help in the design of an effective support system for Knowledge Discovery in Databases in network environments. ...
of granularity, from the use of a single tool, to the management of whole, distributed, KDD projects. ...
(see also [13] for an extensive survey), without considering the KDD process as a whole. ...
doi:10.1109/iscst.2005.1553323
dblp:conf/cts/DiamantiniPP05
fatcat:bvxiv25yq5bkrnr2qr3s4dj2ia
Seismo-Surfer: A Prototype for Collecting, Querying, and Mining Seismic Data
[chapter]
2003
Lecture Notes in Computer Science
Collecting and querying seismic data is a procedure useful for local authorities in order to keep citizens informed as well as for specialized scientists, such as seismologists, physicists etc., in order ...
Thus, a spatiotemporal database system, a set of data analysis and knowledge discovery techniques and a userfriendly visualization interface, compose the Seismo-Surfer, a prototype that, further to the ...
Acknowledgements The author wishes to thank the anonymous referees for their comments. ...
doi:10.1007/3-540-38076-0_11
fatcat:ow7eo2zvdjfkpgpdp6ogkf22de
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets
[article]
2018
arXiv
pre-print
These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets ...
Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. ...
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets :9 A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats ...
arXiv:1806.03517v1
fatcat:d6vf2i7gkzbjvm6zb7s6hqcn2e
KDD Support Services Based on Data Semantics
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we present an approach to the characterization of semantic domain information for a particular kind of KDD process: classification. ...
In order to successfully achieve such a complex goal, many kinds of semantic information about the KDD and business domains is necessary. ...
His vision of semantics in the KDD field deeply inspired and guided our research. ...
doi:10.1007/11603412_9
fatcat:e57bkak2cjet3oqub6oeerg2wm
A survey of data mining and knowledge discovery software tools
1999
SIGKDD Explorations
In this paper, we provide an overview of common knowledge discovery tasks and approaches to solve these tasks. ...
Finally, we specify features that we consider important for knowledge discovery software to possess in order to accommodate its users effectively, as well as issues that are either not addressed or insufficiently ...
Users usually are teams of analysis experts (with expertise in KDD technology) and domain experts (with extensive knowledge of the application domain). 3) Fully exploitation of KDD technology within the ...
doi:10.1145/846170.846172
fatcat:733gyr2r2vbexp6zw5eq5f347e
A Security Threats Taxonomy for Routing System Intrusion Detection
2016
2016 12th International Conference on Computational Intelligence and Security (CIS)
These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets ...
Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. ...
A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets :9 A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats ...
doi:10.1109/cis.2016.0068
dblp:conf/cis/MiaoWGZ16
fatcat:qp7rz34u3fbhhlvfxl5nakdewe
Semantic Web in Data Mining and Knowledge Discovery: A Comprehensive Survey
2016
Social Science Research Network
The survey shows that, while there are numerous interesting research works performed, the full potential of the Semantic Web and Linked Open Data for data mining and KDD is still to be unlocked. ...
This survey article gives a comprehensive overview of those approaches in different stages of the knowledge discovery process. ...
Acknowledgment The work presented in this paper has been partly funded by the German Research Foundation (DFG) under grant number PA 2373/1-1 (Mine@LOD). ...
doi:10.2139/ssrn.3199217
fatcat:flyrsd5wonfqhbxbqmyfb7u25e
An Application-Based Review of Recent Advances of Data Mining in Healthcare
2020
Journal of biostatistics and epidemiology
Data mining as an integral part of the knowledge discovery in database (KDD) has gained significant attention over the past few years. ...
By and large, data mining is the process of finding interesting structures in a considerably voluminous amount of data. ...
Moreover, an applicationbased paper for the usage of data mining applications in healthcare could be informative for further researches of scientists. ...
doi:10.18502/jbe.v5i4.3864
fatcat:gxb6tfvr6rcwdpsbtpmxcpikbi
Investigating and reflecting on the integration of automatic data analysis and visualization in knowledge discovery
2010
SIGKDD Explorations
In particular it looks at strengths and weaknesses of information visualization (infovis) and data mining, and for which purposes researchers in infovis use data mining techniques and reversely how researchers ...
in data mining employ infovis techniques. ...
There is no reason in principle not to use the same technique in information visualization to allow for verification of extracted patterns. ...
doi:10.1145/1809400.1809404
fatcat:qoigohdou5f2foqcw3xkjytcdy
Semantic Web in data mining and knowledge discovery: A comprehensive survey
2016
Journal of Web Semantics
The survey shows that, while there are numerous interesting research works performed, the full potential of the Semantic Web and Linked Open Data for data mining and KDD is still to be unlocked. ...
This survey article gives a comprehensive overview of those approaches in different stages of the knowledge discovery process. ...
Acknowledgment The work presented in this paper has been partly funded by the German Research Foundation (DFG) under grant number PA 2373/1-1 (Mine@LOD). ...
doi:10.1016/j.websem.2016.01.001
fatcat:yz26fm667jbtbgzmdvd4hswopi
A knowledge discovery in databases approach for industrial microgrid planning
2016
Renewable & Sustainable Energy Reviews
Following this approach, KDD techniques and specially DM techniques can exploit data gathered by MES, EMS and ERPs. ...
SYSTEM VISUALIZATION BASED ON COMMON INFORMATION MODEL DATA-DRIVEN VISUALIZATION CABLE LAYOUT DESIGN FOR WIND FARMS LOAD POCKET IDENTIFICATION PROBABILISTIC EVALUATION OF TOTAL TRANSFER CAPABILITY LOAD ...
doi:10.1016/j.rser.2016.01.091
fatcat:53wr2iknkzdw7nbvboszefaryy
Formal Concept Analysis in Knowledge Discovery: A Survey
[chapter]
2010
Lecture Notes in Computer Science
We use the visualization capabilities of FCA to explore the literature, to discover and conceptually represent the main research topics in the FCA community. ...
As a case study, we zoom in on the 140 papers on using FCA in knowledge discovery and data mining and give an extensive overview of the contents of this literature. ...
Acknowledgements Jonas Poelmans is aspirant of the ''Research Foundation -Flanders" or "Fonds voor Wetenschappelijk Onderzoek -Vlaanderen''. ...
doi:10.1007/978-3-642-14197-3_15
fatcat:e2d6pofivza6pcyn72m3tjrbda
Implementation of ML Algorithm's for Cyber Security
2021
International Journal of Scientific Research in Science and Technology
Since information are so critical in ML/DL strategies, we portray a portion of the normally utilized system datasets utilized in ML/DL, examine the difficulties of utilizing ML/DL for digital security ...
As system movement, action is one of the principle characteristics of malware and botnet task, activity investigation is frequently observed as one of the key methods for recognizing traded off machines ...
Entities that become arbiters of information are bigger targets for exploitation, but are also in the perfect position to make use of the data and their user base to achieve better security. ...
doi:10.32628/cseit217416
fatcat:6ayyuqblnjb5rm7ksurmksejr4
« Previous
Showing results 1 — 15 out of 1,536 results