Sciweavers

839 search results - page 76 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
143
Voted
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 3 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
103
Voted
KDD
2005
ACM
171views Data Mining» more  KDD 2005»
16 years 1 months ago
Deriving marketing intelligence from online discussion
Weblogs and message boards provide online forums for discussion that record the voice of the public. Woven into this mass of discussion is a wide range of opinion and commentary a...
Natalie S. Glance, Matthew Hurst, Kamal Nigam, Mat...
99
Voted
UIST
1997
ACM
15 years 4 months ago
Flexible Conflict Detection and Management in Collaborative Applications
This paper presents a comprehensive model for dealing with semantic conflicts in applications, and the implementation of this model in a toolkit for collaborative systems. Conflic...
W. Keith Edwards
96
Voted
LWA
2007
15 years 2 months ago
Incremental Mining for Facility Management
Modern buildings are equipped with high-tech systems that take care of several fundamental aspects, e.g., air-conditioning, heating and water supply. The requirements posed on fac...
Katja Hose, Marcel Karnstedt, Daniel Klan, Kai-Uwe...
ESWA
2002
134views more  ESWA 2002»
15 years 12 days ago
A personalized recommender system based on web usage mining and decision tree induction
A personalized product recommendation is an enabling mechanism to overcome information overload occurred when shopping in an Internet marketplace. Collaborative filtering has been...
Yoon Ho Cho, Jae Kyeong Kim, Soung Hie Kim