Sciweavers

839 search results - page 106 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
ICDM
2007
IEEE
95views Data Mining» more  ICDM 2007»
15 years 7 months ago
Incremental Quantization for Aging Data Streams
A growing number of applications have become reliant or can benefit from monitoring data streams. Data streams are potentially unbounded in size, hence, Data Stream Management Sy...
Fatih Altiparmak, David Chiu, Hakan Ferhatosmanogl...
140
Voted
SIGIR
2011
ACM
14 years 3 months ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
109
Voted
DATESO
2010
148views Database» more  DATESO 2010»
14 years 10 months ago
Using Spectral Clustering for Finding Students' Patterns of Behavior in Social Networks
Abstract. The high dimensionality of the data generated by social networks has been a big challenge for researchers. In order to solve the problems associated with this phenomenon,...
Gamila Obadi, Pavla Drázdilová, Jan ...
ASPLOS
2011
ACM
14 years 4 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...
BPM
2009
Springer
340views Business» more  BPM 2009»
15 years 7 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...