Sciweavers

1259 search results - page 3 / 252
» Information Management and Process Improvement Using Data Mi...
Sort
View
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 1 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
SACMAT
2003
ACM
14 years 21 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
IEAAIE
2010
Springer
13 years 5 months ago
Web Usage Mining for Improving Students Performance in Learning Management Systems
An innovative technique based on multi-objective grammar guided genetic programming (MOG3P-MI) is proposed to detect the most relevant activities that a student needs to pass a cou...
Amelia Zafra, Sebastián Ventura
IJBIDM
2006
75views more  IJBIDM 2006»
13 years 7 months ago
Web process and workflow path mining using the Multimethod approach
: Workflow Management Systems (WfMS) provide a fundamental technological infrastructure to define and manage business processes efficiently. WfMS logs contain valuable data that ca...
Jorge Cardoso, Mitja Lenic
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof