Sciweavers

1489 search results - page 160 / 298
» The First Bug Report
Sort
View
CHI
2009
ACM
16 years 5 months ago
Friend or foe?: examining CAS use in mathematics research
Computer Algebra Systems (CAS) provide sophisticated functionality to assist with mathematical problem solving. Despite their widespread adoption, however, little work in the HCI ...
Andrea Bunt, Michael Terry, Edward Lank
KDD
2009
ACM
150views Data Mining» more  KDD 2009»
16 years 5 months ago
Large human communication networks: patterns and a utility-driven generator
Given a real, and weighted person-to-person network which changes over time, what can we say about the cliques that it contains? Do the incidents of communication, or weights on t...
Nan Du, Christos Faloutsos, Bai Wang, Leman Akoglu
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 5 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
KDD
2002
ACM
186views Data Mining» more  KDD 2002»
16 years 5 months ago
Topic-conditioned novelty detection
Automated detection of the first document reporting each new event in temporally-sequenced streams of documents is an open challenge. In this paper we propose a new approach which...
Yiming Yang, Jian Zhang, Jaime G. Carbonell, Chun ...
KDD
2001
ACM
211views Data Mining» more  KDD 2001»
16 years 5 months ago
Magical thinking in data mining: lessons from CoIL challenge 2000
CoIL challenge 2000 was a supervised learning contest that attracted 43 entries. The authors of 29 entries later wrote explanations of their work. This paper discusses these repor...
Charles Elkan