Sciweavers

1702 search results - page 195 / 341
» Hidden Pattern Statistics
Sort
View
140
Voted
DAGSTUHL
2007
15 years 4 months ago
Subspace outlier mining in large multimedia databases
Abstract. Increasingly large multimedia databases in life sciences, ecommerce, or monitoring applications cannot be browsed manually, but require automatic knowledge discovery in d...
Ira Assent, Ralph Krieger, Emmanuel Müller, T...
102
Voted
OPODIS
2007
15 years 3 months ago
Secretive Birds: Privacy in Population Protocols
We study private computations in a system of tiny mobile agents. We consider the mobile population protocol model of Angluin et al. [2] and ask what can be computed without ever re...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
AAAI
2004
15 years 3 months ago
Analogical Path Planning
We present a probabilistic method for path planning that considers trajectories constrained by both the environment and an ensemble of restrictions or preferences on preferred mot...
Saul Simhon, Gregory Dudek
114
Voted
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 3 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
104
Voted
NLUCS
2004
15 years 3 months ago
A Text Mining Approach to Tracking Elements of Decision Making: a pilot study
Understanding rework, the causes of rework, and the relationship between issues, decisions and the associated actions, is crucial in minimizing the fundamental industrial problems ...
Caroline Chibelushi, Bernadette Sharp, Andy Salter