Sciweavers

773 search results - page 100 / 155
» Mining taxonomies of process models
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 8 days ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
86
Voted
GCC
2005
Springer
15 years 5 months ago
Supporting Remote Collaboration Through Structured Activity Logging
Abstract. This paper describes an integrated architecture for online collaborative multimedia (audio and text) meetings which supports the recording of participants' audio exc...
Matt-Mouley Bouamrane, Saturnino Luz, Masood Masoo...
KDD
2010
ACM
282views Data Mining» more  KDD 2010»
15 years 3 months ago
Optimizing debt collections using constrained reinforcement learning
In this paper, we propose and develop a novel approach to the problem of optimally managing the tax, and more generally debt, collections processes at financial institutions. Our...
Naoki Abe, Prem Melville, Cezar Pendus, Chandan K....
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 1 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
15 years 9 months ago
Boilerplate Detection using Shallow Text Features
In addition to the actual content Web pages consist of navigational elements, templates, and advertisements. This boilerplate text typically is not related to the main content, ma...
Christian Kohlschütter, Peter Fankhauser, Wol...