Sciweavers

1647 search results - page 165 / 330
» Relationship Aspect Patterns
Sort
View
119
Voted
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 4 months ago
Constraint programming for itemset mining
The relationship between constraint-based mining and constraint programming is explored by showing how the typical constraints used in pattern mining can be formulated for use in ...
Luc De Raedt, Tias Guns, Siegfried Nijssen
112
Voted
CHI
2007
ACM
16 years 4 months ago
How HCI interprets the probes
We trace how cultural probes have been adopted and adapted by the HCI community. The flexibility of probes has been central to their uptake, resulting in a proliferation of diverg...
Kirsten Boehner, Janet Vertesi, Phoebe Sengers, Pa...
154
Voted
CHI
2003
ACM
16 years 4 months ago
Dynamic query sliders vs. brushing histograms
Dynamic queries facilitate exploration of information through real-time visual display of both query formulation and results. Dynamic query sliders are linked to the main visualiz...
Qing Li, Xiaofeng Bao, Chen Song, Jinfei Zhang, Ch...
100
Voted
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 10 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
127
Voted
CIDM
2009
IEEE
15 years 10 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder