Sciweavers

924 search results - page 106 / 185
» Active Mining of Data Streams
Sort
View
ICML
2010
IEEE
13 years 11 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
IUI
2000
ACM
14 years 2 months ago
Mining navigation history for recommendation
Although a user’s navigation history contains a lot of hidden information about the relationship between web pages and between users, this information is usually not exploited. ...
Xiaobin Fu, Jay Budzik, Kristian J. Hammond
ICDM
2002
IEEE
91views Data Mining» more  ICDM 2002»
14 years 3 months ago
Mining Molecular Fragments: Finding Relevant Substructures of Molecules
We present an algorithm to find fragments in a set of molecules that help to discriminate between different classes of, for instance, activity in a drug discovery context. Instea...
Christian Borgelt, Michael R. Berthold
TKDE
2008
134views more  TKDE 2008»
13 years 10 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 2 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley