Sciweavers

3651 search results - page 154 / 731
» Data Mining for Security Applications
Sort
View
WECWIS
2002
IEEE
131views ECommerce» more  WECWIS 2002»
15 years 10 months ago
Mining Client-Side Activity for Personalization
“Garbage in. garbage out” is a well-known phrase in computer analysis, and one that comes to mind when mining Web data to draw conclusions about Web users. The challenge is th...
Kurt D. Fenstermacher, Mark Ginsburg
EDBT
2006
ACM
150views Database» more  EDBT 2006»
16 years 5 months ago
On Futuristic Query Processing in Data Streams
Recent advances in hardware technology have resulted in the ability to collect and process large amounts of data. In many cases, the collection of the data is a continuous process ...
Charu C. Aggarwal
WSCG
2004
170views more  WSCG 2004»
15 years 6 months ago
Geo-Spatial Data Viewer: From Familiar Land-covering to Arbitrary Distorted Geo-Spatial Quadtree Maps
In many application domains, data is collected and referenced by its geo-spatial location. Spatial data mining, or the discovery of interesting patterns in such databases, is an i...
Daniel A. Keim, Christian Panse, Jörn Schneid...
287
Voted
ISMIS
2011
Springer
14 years 8 months ago
Data Access Paths in Processing of Sets of Frequent Itemset Queries
Abstract. Frequent itemset mining can be regarded as advanced database querying where a user specifies the dataset to be mined and constraints to be satisfied by the discovered i...
Piotr Jedrzejczak, Marek Wojciechowski
JCIT
2008
165views more  JCIT 2008»
15 years 5 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen