Sciweavers

398 search results - page 4 / 80
» Mining System Audit Data: Opportunities and Challenges
Sort
View
ISMIS
2009
Springer
15 years 4 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ICMCS
2009
IEEE
147views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Not all tags are created equal: Learning flickr tag semantics for global annotation
Large collaborative datasets offer the challenging opportunity of creating systems capable of extracting knowledge in the presence of noisy data. In this work we explore the abili...
Emily Moxley, Jim Kleban, Jiejun Xu, B. S. Manjuna...
WWW
2010
ACM
15 years 4 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
15 years 9 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
HIPC
1999
Springer
15 years 1 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava