Sciweavers

792 search results - page 154 / 159
» Knowledge Engineering: Principles and Methods
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 9 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
WSC
1998
13 years 9 months ago
Simulation of Large Precast Operations
This paper presents the analysis of the optimization for the production of precast pieces in a workshop with the help of simulation to obtain several working alternatives. The mai...
Edmundo Balbontín-Bravo
CORR
2007
Springer
151views Education» more  CORR 2007»
13 years 7 months ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
ECIR
2009
Springer
13 years 5 months ago
Refining Keyword Queries for XML Retrieval by Combining Content and Structure
Abstract. The structural heterogeneity and complexity of XML repositories makes query formulation challenging for users who have little knowledge of XML. To assist its users, an XM...
Desislava Petkova, W. Bruce Croft, Yanlei Diao
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
14 years 1 months ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...