Sciweavers

352 search results - page 43 / 71
» Crime Data Mining: An Overview and Case Studies
Sort
View
BPM
2009
Springer
175views Business» more  BPM 2009»
14 years 2 months ago
Understanding Spaghetti Models with Sequence Clustering for ProM
The goal of process mining is to discover process models from event logs. However, for processes that are not well structured and have a lot of diverse behavior, existing process m...
Gabriel M. Veiga, Diogo R. Ferreira
ISSTA
2009
ACM
14 years 2 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
ASIAMS
2008
IEEE
13 years 10 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
KBSE
2010
IEEE
13 years 5 months ago
An experience report on scaling tools for mining software repositories using MapReduce
The need for automated software engineering tools and techniques continues to grow as the size and complexity of studied systems and analysis techniques increase. Software enginee...
Weiyi Shang, Bram Adams, Ahmed E. Hassan
ICDM
2005
IEEE
163views Data Mining» more  ICDM 2005»
14 years 1 months ago
Efficient Text Classification by Weighted Proximal SVM
In this paper, we present an algorithm that can classify large-scale text data with high classification quality and fast training speed. Our method is based on a novel extension o...
Dong Zhuang, Benyu Zhang, Qiang Yang, Jun Yan, Zhe...