Sciweavers

2424 search results - page 158 / 485
» A general algorithm for data dependence analysis
Sort
View
138
Voted
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 7 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
99
Voted
DSN
2007
IEEE
15 years 9 months ago
On the Quality of Service of Crash-Recovery Failure Detectors
In this paper, we study and model a crash-recovery target and its failure detector’s probabilistic behavior. We extend Quality of Service (QoS) metrics to measure the recovery d...
Tiejun Ma, Jane Hillston, Stuart Anderson
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 3 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CVPR
2007
IEEE
16 years 5 months ago
Incremental Linear Discriminant Analysis Using Sufficient Spanning Set Approximations
This paper presents a new incremental learning solution for Linear Discriminant Analysis (LDA). We apply the concept of the sufficient spanning set approximation in each update st...
Björn Stenger, Josef Kittler, Roberto Cipolla...
147
Voted
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 7 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...