Sciweavers

360 search results - page 29 / 72
» A Process Mining Approach to Analyse User Behaviour
Sort
View
WEBDB
2004
Springer
202views Database» more  WEBDB 2004»
15 years 5 months ago
Mining Approximate Functional Dependencies and Concept Similarities to Answer Imprecise Queries
Current approaches for answering queries with imprecise constraints require users to provide distance metrics and importance measures for attributes of interest. In this paper we ...
Ullas Nambiar, Subbarao Kambhampati
APCCM
2006
15 years 1 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
ICEIS
2008
IEEE
15 years 6 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
EICS
2010
ACM
15 years 3 months ago
WebWOZ: a wizard of oz prototyping framework
Language Technology (LT) based applications become more popular as technology improves. Prototyping early in the design process is critical for the development of high quality app...
Stephan Schlögl, Gavin Doherty, Nikiforos Kar...
SAFECOMP
2010
Springer
14 years 10 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska