Sciweavers

1103 search results - page 98 / 221
» Evaluating CBR Systems Using Different Data Sources: A Case ...
Sort
View
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
14 years 8 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
CAISE
2010
Springer
13 years 3 months ago
Workflow Time Patterns for Process-Aware Information Systems
Abstract. Formal specification and operational support of time constraints constitute fundamental challenges for any process-aware information system. Although temporal constraints...
Andreas Lanz, Barbara Weber, Manfred Reichert
HCI
2007
13 years 9 months ago
Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique
Abstract. We describe the results of an empirical study comparing an interactive Information Visualization (InfoVis) technique called Gravi++ (GRAVI), Exploratory Data Analysis (ED...
Markus Rester, Margit Pohl, Sylvia Wiltner, Klaus ...
DASFAA
2008
IEEE
149views Database» more  DASFAA 2008»
13 years 9 months ago
A Test Paradigm for Detecting Changes in Transactional Data Streams
A pattern is considered useful if it can be used to help a person to achieve his goal. Mining data streams for useful patterns is important in many applications. However, data stre...
Willie Ng, Manoranjan Dash
DSN
2008
IEEE
14 years 2 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...