Sciweavers

360 search results - page 47 / 72
» A Process Mining Approach to Analyse User Behaviour
Sort
View
MSR
2010
ACM
15 years 1 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
VRML
2004
ACM
15 years 5 months ago
Interactive Web-based visualisation of block model data
Mining operations have traditionally used specialised software packages to process and visualise valuable mining data. The downside to this approach is that the information can on...
Tony Gill, Con Caris, Guy LeBlanc Smith
BIBM
2007
IEEE
159views Bioinformatics» more  BIBM 2007»
15 years 6 months ago
Predicting Future High-Cost Patients: A Real-World Risk Modeling Application
Health care data from patients in the Arizona Health Care Cost Containment System, Arizona’s Medicaid program, provides a unique opportunity to exploit state-of-the-art data pro...
Sai T. Moturu, William G. Johnson, Huan Liu
85
Voted
CHI
2004
ACM
16 years 4 days ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
92
Voted
CVPR
2008
IEEE
16 years 1 months ago
Information-theoretic active scene exploration
Studies support the need for high resolution imagery to identify persons in surveillance videos[13]. However, the use of telephoto lenses sacrifices a wider field of view and ther...
Eric Sommerlade, Ian Reid