Sciweavers

3070 search results - page 174 / 614
» Making pattern mining useful
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 3 hour ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
IPC
2007
IEEE
14 years 2 months ago
Mining User Models for Effective Adaptation of Context-Aware Applications
Current context-aware adaptation techniques are limited in their support for user personalisation. Complex codebases, a reliance on developer modification and an inability to auto...
Shiu Lun Tsang, Siobhán Clarke
CINQ
2004
Springer
182views Database» more  CINQ 2004»
13 years 12 months ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
IRI
2003
IEEE
14 years 1 months ago
An Information Model of Virtual Collaboration
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collabo...
Robert P. Biuk-Aghai
AUSAI
2003
Springer
14 years 1 months ago
A Case Study in Feature Invention for Breast Cancer Diagnosis Using X-Ray Scatter Images
Abstract. X-ray mammography is the current clinical method for screening for breast cancer, and like any technique, has its limitations. Several groups have reported differences i...
Shane M. Butler, Geoffrey I. Webb, Rob A. Lewis