Sciweavers

508 search results - page 28 / 102
» Active Mining
Sort
View
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
15 years 6 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
DAWAK
2005
Springer
15 years 5 months ago
Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates
Extract-Transform-Load (ETL) workflows are data centric workflows responsible for transferring, cleaning, and loading data from their respective sources to the warehouse. Previous ...
Alkis Simitsis, Panos Vassiliadis, Manolis Terrovi...
GCC
2005
Springer
15 years 5 months ago
Supporting Remote Collaboration Through Structured Activity Logging
Abstract. This paper describes an integrated architecture for online collaborative multimedia (audio and text) meetings which supports the recording of participants' audio exc...
Matt-Mouley Bouamrane, Saturnino Luz, Masood Masoo...
TKDE
2011
186views more  TKDE 2011»
14 years 6 months ago
Discovering Activities to Recognize and Track in a Smart Environment
—The machine learning and pervasive sensing technologies found in smart homes offer unprecedented opportunities for providing health monitoring and assistance to individuals expe...
Parisa Rashidi, Diane J. Cook, Lawrence B. Holder,...
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
15 years 12 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...