Sciweavers

123 search results - page 5 / 25
» Characterizing Database User's Access Patterns
Sort
View
RAID
2010
Springer
13 years 5 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ADC
2006
Springer
188views Database» more  ADC 2006»
14 years 1 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
FQAS
2000
Springer
80views Database» more  FQAS 2000»
13 years 11 months ago
A Knowledge Scout for Discovering Medical Patterns: Methodology and System SCAMP
Knowledge scouts are software agents that autonomously synthesize knowledge of interest to a given user (target knowledge) by applying inductive database operators to a local or di...
Kenneth A. Kaufman, Ryszard S. Michalski
EDBTW
2006
Springer
13 years 11 months ago
Pattern-Based Query Answering
Users without knowledge of schemas or structured query languages have difficulties in accessing information stored in databases. Commercial and research efforts have focused on key...
Alkis Simitsis, Georgia Koutrika
WWW
2004
ACM
14 years 8 months ago
On mining webclick streams for path traversal patterns
Mining user access patterns from a continuous stream of Web-clicks presents new challenges over traditional Web usage mining in a large static Web-click database. Modeling user ac...
Hua-Fu Li, Suh-Yin Lee, Man-Kwan Shan