Sciweavers

2032 search results - page 367 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
SDM
2009
SIAM
112views Data Mining» more  SDM 2009»
15 years 6 months ago
A Re-evaluation of the Over-Searching Phenomenon in Inductive Rule Learning.
Most commonly used inductive rule learning algorithms employ a hill-climbing search, whereas local pattern discovery algorithms employ exhaustive search. In this paper, we evaluat...
Frederik Janssen, Johannes Fürnkranz
ISNN
2007
Springer
15 years 3 months ago
Two-Dimensional Bayesian Subspace Analysis for Face Recognition
Bayesian subspace analysis (BSA) has been successfully applied in data mining and pattern recognition. However, due to the use of probabilistic measure of similarity, it often need...
Daoqiang Zhang
86
Voted
DEXA
2004
Springer
140views Database» more  DEXA 2004»
15 years 3 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
77
Voted
ARTMED
2006
75views more  ARTMED 2006»
14 years 9 months ago
Semi-automatic learning of simple diagnostic scores utilizing complexity measures
Objective: Knowledge acquisition and maintenance in medical domains with a large application domain ontology is a difficult task. To reduce knowledge elicitation costs, semiautoma...
Martin Atzmüller, Joachim Baumeister, Frank P...