Sciweavers

366 search results - page 66 / 74
» Mining Based on Learning from Process Change Logs
Sort
View
102
Voted
JSSPP
2005
Springer
15 years 5 months ago
AnthillSched: A Scheduling Strategy for Irregular and Iterative I/O-Intensive Parallel Jobs
Irregular and iterative I/O-intensive jobs need a different approach from parallel job schedulers. The focus in this case is not only the processing requirements anymore: memory, ...
Luís Fabrício Wanderley Góes,...
MVA
2007
150views Computer Vision» more  MVA 2007»
15 years 1 months ago
Detecting the Degree of Anomal in Security Video
We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
Kyoko Sudo, Tatsuya Osawa, Xiaojun Wu, Kaoru Wakab...
JAIR
2010
181views more  JAIR 2010»
14 years 6 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
DIDACTICA
2000
110views more  DIDACTICA 2000»
14 years 11 months ago
Umsetzung von Grundkonzepten der Informatik zur fachlichen Orientierung im Informatikunterricht
Abstract During its development computer science has more and more established a way it sees itself. However, in recent years the rise of distributed systems and object orientation...
Ludger Humbert
86
Voted
DATAMINE
2006
89views more  DATAMINE 2006»
14 years 11 months ago
Scalable Clustering Algorithms with Balancing Constraints
Clustering methods for data-mining problems must be extremely scalable. In addition, several data mining applications demand that the clusters obtained be balanced, i.e., be of ap...
Arindam Banerjee, Joydeep Ghosh