Sciweavers

398 search results - page 17 / 80
» Mining System Audit Data: Opportunities and Challenges
Sort
View
APN
2005
Springer
15 years 3 months ago
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Pro...
Boudewijn F. van Dongen, Ana Karla A. de Medeiros,...
KDD
2005
ACM
153views Data Mining» more  KDD 2005»
15 years 10 months ago
Using retrieval measures to assess similarity in mining dynamic web clickstreams
While scalable data mining methods are expected to cope with massive Web data, coping with evolving trends in noisy data in a continuous fashion, and without any unnecessary stopp...
Olfa Nasraoui, Cesar Cardona, Carlos Rojas
FUIN
2007
109views more  FUIN 2007»
14 years 9 months ago
Unifying Framework for Rule Semantics: Application to Gene Expression Data
Abstract. The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional dependencies in databases. Their s...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki
79
Voted
DEXAW
2002
IEEE
102views Database» more  DEXAW 2002»
15 years 2 months ago
Designing a Curious Negotiator
In negotiation the exchange of contextual information is as important as the exchange of specific offers. The curious negotiator is a multiagent system with three types of agent. ...
John K. Debenham, Simeon J. Simoff
ACSAC
1998
IEEE
15 years 1 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer