搜索资源列表
-
0下载:
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering
techniques that are frequently used in data mining have been developed in machine learning
research community. Frequent pattern and asso
-
-
0下载:
In Information Security, intrusion detection is the act
of detecting actions that attempt to compromise the confidentiality,
integrity or availability of a resource. Intrusion detection does not,
in general, include prevention of intrusions. In
-
-
0下载:
"Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from "data-centered patte
-
-
0下载:
In recent years and within the intrusion detection
domain, an increasingly evident trend has emerged.
The trend stands within the crossroads of multi-agent systems and data mining. The documents present some related works introducing distributed
-