Sciweavers

979 search results - page 113 / 196
» Functional Properties of Information Filtering
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
COOPIS
2004
IEEE
14 years 27 days ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
CVPR
2006
IEEE
14 years 25 days ago
Single-Image Vignetting Correction
In this paper, we propose a method for determining the vignetting function given only a single image. Our method is designed to handle both textured and untextured regions in orde...
Yuanjie Zheng, Stephen Lin, Sing Bing Kang
DMIN
2006
138views Data Mining» more  DMIN 2006»
13 years 10 months ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel
IDA
2009
Springer
13 years 6 months ago
Ontology-Driven KDD Process Composition
Abstract. One of the most interesting challenges in Knowledge Discovery in Databases (KDD) eld is giving support to users in the composition of tools for forming a valid and useful...
Claudia Diamantini, Domenico Potena, Emanuele Stor...