Sciweavers

627 search results - page 55 / 126
» Learning from Logged Implicit Exploration Data
Sort
View
188
Voted
ICONFERENCE
2012
13 years 8 months ago
No forests without trees: particulars and patterns in visualizing personal communication
When people use visualizations of conversational archives, they typically reflect on particular events, rather than patterns of activity over time. We explore whether this is a fu...
Ou Jie Zhao, Tiffany Ng, Dan Cosley
103
Voted
WWW
2009
ACM
16 years 1 months ago
Constructing folksonomies from user-specified relations on flickr
Automatic folksonomy construction from tags has attracted much attention recently. However, inferring hierarchical relations between concepts from tags has a drawback in that it i...
Anon Plangprasopchok, Kristina Lerman
130
Voted
WIDM
2012
ACM
13 years 8 months ago
Replaying history on process models for conformance checking and performance analysis
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
121
Voted
ICML
2002
IEEE
16 years 1 months ago
Learning the Kernel Matrix with Semi-Definite Programming
Kernel-based learning algorithms work by embedding the data into a Euclidean space, and then searching for linear relations among the embedded data points. The embedding is perfor...
Gert R. G. Lanckriet, Nello Cristianini, Peter L. ...
96
Voted
ISMIS
2005
Springer
15 years 6 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni