Sciweavers

258 search results - page 25 / 52
» Discovering Informative Patterns and Data Cleaning
Sort
View
82
Voted
CHI
2007
ACM
16 years 5 days ago
Exploring patterns of social commonality among file directories at work
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...
ICDE
2004
IEEE
133views Database» more  ICDE 2004»
16 years 1 months ago
GenExplore: Interactive Exploration of Gene Interactions from Microarray Data
DNA Microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Yong Ye, Xintao Wu, Kalpathi R. Subramanian, Liyin...
ISDA
2009
IEEE
15 years 6 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy
CORR
2006
Springer
186views Education» more  CORR 2006»
14 years 11 months ago
SASE: Complex Event Processing over Streams
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of dat...
Daniel Gyllstrom, Eugene Wu 0002, Hee-Jin Chae, Ya...
IEEEIAS
2007
IEEE
15 years 6 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...