Sciweavers

875 search results - page 25 / 175
» Data Mining for Modeling Chiller Systems in Data Centers
Sort
View
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 12 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
AAAI
2010
13 years 9 months ago
Collaborative Filtering Meets Mobile Recommendation: A User-Centered Approach
With the increasing popularity of location tracking services such as GPS, more and more mobile data are being accumulated. Based on such data, a potentially useful service is to m...
Vincent Wenchen Zheng, Bin Cao, Yu Zheng, Xing Xie...
SG
2009
Springer
14 years 9 days ago
User-Centered Development of a Visual Exploration System for In-Car Communication
Abstract. Modern premium automobiles are equipped with an increasing number of Electronic Control Units (ECUs). These ECUs are interconnected and form a complex network to provide ...
Michael Sedlmair, Benjamin Kunze, Wolfgang Hinterm...
DKE
2006
84views more  DKE 2006»
13 years 7 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...