Sciweavers

2032 search results - page 104 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
15 years 10 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
ISDA
2009
IEEE
15 years 4 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy
CORR
2010
Springer
208views Education» more  CORR 2010»
14 years 10 months ago
Discovering potential user browsing behaviors using custom-built apriori algorithm
Most of the organizations put information on the web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay a whi...
Sandeep Singh Rawat, Lakshmi Rajamani
OSDI
2008
ACM
15 years 10 months ago
Mining Console Logs for Large-Scale System Problem Detection
The console logs generated by an application contain messages that the application developers believed would be useful in debugging or monitoring the application. Despite the ubiq...
Wei Xu, Ling Huang, Armando Fox, David A. Patterso...
BPM
2004
Springer
167views Business» more  BPM 2004»
15 years 3 months ago
Mining Social Networks: Uncovering Interaction Patterns in Business Processes
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
Wil M. P. van der Aalst, Minseok Song