Sciweavers

2558 search results - page 48 / 512
» Analysis of Generalized Pattern Searches
Sort
View
IICAI
2003
13 years 9 months ago
Web Usage Mining: Extraction, Maintenance and Behaviour Trends
With the growing popularity of the web, large volumes of data are gathered automatically by Web Servers and collected into access log files. Analysis of such files is generally cal...
Pierre-Alain Laur, Maguelonne Teisseire, Pascal Po...
CCS
2008
ACM
13 years 9 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
SDM
2009
SIAM
112views Data Mining» more  SDM 2009»
14 years 4 months ago
A Re-evaluation of the Over-Searching Phenomenon in Inductive Rule Learning.
Most commonly used inductive rule learning algorithms employ a hill-climbing search, whereas local pattern discovery algorithms employ exhaustive search. In this paper, we evaluat...
Frederik Janssen, Johannes Fürnkranz
TITS
2008
250views more  TITS 2008»
13 years 7 months ago
Learning, Modeling, and Classification of Vehicle Track Patterns from Live Video
This paper presents two different types of visual activity analysis modules based on vehicle tracking. The highway monitoring module accurately classifies vehicles into eight diffe...
Brendan Tran Morris, Mohan M. Trivedi
FAST
2010
13 years 10 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...