Sciweavers

8881 search results - page 1590 / 1777
» Active Data Clustering
Sort
View
ECML
2007
Springer
15 years 8 months ago
Finding Composite Episodes
Mining frequent patterns is a major topic in data mining research, resulting in many seminal papers and algorithms on item set and episode discovery. The combination of these, call...
Ronnie Bathoorn, Arno Siebes
ECRIME
2007
15 years 8 months ago
Examining the impact of website take-down on phishing
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraud...
Tyler Moore, Richard Clayton
ACSAC
2004
IEEE
15 years 8 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
ACSC
2004
IEEE
15 years 8 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
144
Voted
BPM
2006
Springer
107views Business» more  BPM 2006»
15 years 8 months ago
On the Suitability of BPMN for Business Process Modelling
Abstract. In this paper we examine the suitability of the Business Process Modelling Notation (BPMN) for business process modelling, using the Workflow Patterns as an evaluation fr...
Petia Wohed, Wil M. P. van der Aalst, Marlon Dumas...
« Prev « First page 1590 / 1777 Last » Next »