Sciweavers

2032 search results - page 380 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
USENIX
2007
15 years 6 months ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
PKDD
2005
Springer
188views Data Mining» more  PKDD 2005»
15 years 10 months ago
Elastic Partial Matching of Time Series
We consider a problem of elastic matching of time series. We propose an algorithm that automatically determines a subsequence b of a target time series b that best matches a query ...
Longin Jan Latecki, Vasilis Megalooikonomou, Qiang...
AUSDM
2008
Springer
274views Data Mining» more  AUSDM 2008»
15 years 6 months ago
Identifying Stock Similarity Based on Multi-event Episodes
Predicting stock market movements is always difficult. Investors try to guess a stock's behavior, but it often backfires. Thumb rules and intuition seems to be the major indi...
Abhi Dattasharma, Praveen Kumar Tripathi, Sridhar ...
CIARP
2005
Springer
15 years 10 months ago
Dynamic Hierarchical Compact Clustering Algorithm
Abstract. In this paper we introduce a general framework for hierarchical clustering that deals with both static and dynamic data sets. From this framework, different hierarchical...
Reynaldo Gil-García, José Manuel Bad...
UAI
1996
15 years 5 months ago
Bayesian Learning of Loglinear Models for Neural Connectivity
This paper presents a Bayesian approach to learning the connectivity structure of a group of neurons from data on configuration frequencies. A major objective of the research is t...
Kathryn B. Laskey, Laura Martignon