Sciweavers

216 search results - page 38 / 44
» Concept Analysis on Structured, Multi-valued and Incomplete ...
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
BPM
2004
Springer
167views Business» more  BPM 2004»
14 years 1 months ago
Mining Social Networks: Uncovering Interaction Patterns in Business Processes
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
Wil M. P. van der Aalst, Minseok Song
CIKM
2008
Springer
13 years 9 months ago
Mining conceptual graphs for knowledge acquisition
This work addresses the use of computational linguistic analysis techniques for conceptual graphs learning from unstructured texts. A technique including both content mining and i...
Milagros Fernández, Eric Villemonte de la C...
WWW
2004
ACM
14 years 8 months ago
E-learning personalization based on itineraries and long-term navigational behavior
In this paper we describe a practical framework for studying the navigational behavior of the users of an e-learning environment integrated in a virtual campus. The students navig...
Enric Mor, Julià Minguillón
ISMDA
2005
Springer
14 years 1 months ago
The Ontological Lens: Zooming in and out from Genomic to Clinical Level
Abstract. Ontology is the talk of the day in the medical informatics comm.unity. Its relevant role in the design and implementation of information systems in health care is now wid...
Domenico M. Pisanelli, Francesco Pinciroli, Marco ...