Sciweavers

864 search results - page 50 / 173
» Process mining in CSCW systems
Sort
View
WIS
2004
15 years 2 days ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
CSCW
2004
ACM
15 years 4 months ago
Lessons from the reMail prototypes
Electronic mail has become the most widely-used application for business productivity and communication, yet many people are frustrated with their email. Though email usage has ch...
Dan Gruen, Steven L. Rohall, Suzanne O. Minassian,...
PAMI
2008
216views more  PAMI 2008»
14 years 10 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
15 years 11 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
PARCO
1997
15 years 1 days ago
Parallel Database Techniques in Decision Support and Data Mining
During the last decade, all commercial database systems have included features for parallel processing into their products. This development has been driven by the fact that datab...
Andreas Reuter