Sciweavers

536 search results - page 77 / 108
» Modeling Workflow Patterns from First Principles
Sort
View
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 3 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 2 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
120
Voted
WWW
2010
ACM
15 years 9 months ago
Statistical models of music-listening sessions in social media
User experience in social media involves rich interactions with the media content and other participants in the community. In order to support such communities, it is important to...
Elena Zheleva, John Guiver, Eduarda Mendes Rodrigu...
ILP
2003
Springer
15 years 7 months ago
Mining Model Trees: A Multi-relational Approach
In many data mining tools that support regression tasks, training data are stored in a single table containing both the target field (dependent variable) and the attributes (indepe...
Annalisa Appice, Michelangelo Ceci, Donato Malerba
113
Voted
SIGSOFT
2004
ACM
16 years 2 months ago
Empirical evaluation of defect projection models for widely-deployed production software systems
Defect-occurrence projection is necessary for the development of methods to mitigate the risks of software defect occurrences. In this paper, we examine user-reported software def...
Paul Luo Li, Mary Shaw, James D. Herbsleb, Bonnie ...