Sciweavers

345 search results - page 39 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
CCGRID
2009
IEEE
14 years 4 months ago
Multi-scale Real-Time Grid Monitoring with Job Stream Mining
—The ever increasing scale and complexity of large computational systems ask for sophisticated management tools, paving the way toward Autonomic Computing. A first step toward A...
Xiangliang Zhang, Michèle Sebag, Céc...
31
Voted
SAMT
2007
Springer
211views Multimedia» more  SAMT 2007»
14 years 3 months ago
An Architecture for Mining Resources Complementary to Audio-Visual Streams
Abstract. In this paper we attempt to characterize resources of information complementary to audio-visual (A/V) streams and propose their usage for enriching A/V data with semantic...
Jan Nemrava, Paul Buitelaar, Thierry Declerck, Voj...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 10 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 10 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...