Sciweavers

2032 search results - page 380 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
USENIX
2007
14 years 12 months ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
PKDD
2005
Springer
188views Data Mining» more  PKDD 2005»
15 years 3 months ago
Elastic Partial Matching of Time Series
We consider a problem of elastic matching of time series. We propose an algorithm that automatically determines a subsequence b of a target time series b that best matches a query ...
Longin Jan Latecki, Vasilis Megalooikonomou, Qiang...
74
Voted
AUSDM
2008
Springer
274views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Identifying Stock Similarity Based on Multi-event Episodes
Predicting stock market movements is always difficult. Investors try to guess a stock's behavior, but it often backfires. Thumb rules and intuition seems to be the major indi...
Abhi Dattasharma, Praveen Kumar Tripathi, Sridhar ...
CIARP
2005
Springer
15 years 3 months ago
Dynamic Hierarchical Compact Clustering Algorithm
Abstract. In this paper we introduce a general framework for hierarchical clustering that deals with both static and dynamic data sets. From this framework, different hierarchical...
Reynaldo Gil-García, José Manuel Bad...
UAI
1996
14 years 11 months ago
Bayesian Learning of Loglinear Models for Neural Connectivity
This paper presents a Bayesian approach to learning the connectivity structure of a group of neurons from data on configuration frequencies. A major objective of the research is t...
Kathryn B. Laskey, Laura Martignon