Sciweavers

1005 search results - page 176 / 201
» Patterns for Refinement Automation
Sort
View
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
14 years 11 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...
IADIS
2004
14 years 11 months ago
Detecting Unauthorized Use in Online Journal Archives: A Case Study
JSTOR is a not-for-profit online library containing a full back-run of digitized versions of a large number of academic journals. In order to help defray costs for maintaining the...
Paul Seligman, Sean W. Smith
78
Voted
MASCOTS
2004
14 years 11 months ago
Predicting When Not to Predict
File prefetching based on previous file access patterns has been shown to be an effective means of reducing file system latency by implicitly loading caches with files that are li...
Karl Brandt, Darrell D. E. Long, Ahmed Amer
75
Voted
AAAI
1996
14 years 11 months ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski
96
Voted
CLEF
2010
Springer
14 years 10 months ago
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010
Wikipedia describes itself as the "free encyclopedia that anyone can edit". Along with the helpful volunteers who contribute by improving the articles, a great number of ...
Manoj Harpalani, Thanadit Phumprao, Megha Bassi, M...