Sciweavers

508 search results - page 90 / 102
» Active Mining
Sort
View
SIGMOD
2000
ACM
137views Database» more  SIGMOD 2000»
14 years 24 days ago
LOF: Identifying Density-Based Local Outliers
For many KDD applications, such as detecting criminal activities in E-commerce, finding the rare instances or the outliers, can be more interesting than finding the common pattern...
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. ...
MMM
2010
Springer
154views Multimedia» more  MMM 2010»
14 years 7 days ago
Learning Cooking Techniques from YouTube
Abstract. Cooking is a human activity with sophisticated process. Underlying the multitude of culinary recipes, there exist a set of fundamental and general cooking techniques, suc...
Guangda Li, Richang Hong, Yantao Zheng, Shuicheng ...
BPM
2008
Springer
109views Business» more  BPM 2008»
13 years 10 months ago
Automating Knowledge Transfer and Creation in Knowledge Intensive Business Processes
It is a well known fact that a wealth of knowledge relies in the employees which makes them one of the most or even the most valuable asset of organisations. But often this knowled...
Michael Granitzer, Gisela Granitzer, Klaus Tochter...
APPINF
2003
13 years 9 months ago
Seismic Signal Analysis using Correlation Dimension
Multifractal analysis is a new and promising approach to analyze and characterize non-stationary signals such as seismic signals, electrocardiograms, heart rate variability signal...
Soundararajan Ezekiel, Matthew J. Barrick, Matthew...
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 8 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti