Sciweavers

554 search results - page 91 / 111
» Mining Duplicate Tasks from Discovered Processes
Sort
View
DATAMINE
2007
135views more  DATAMINE 2007»
13 years 7 months ago
Experiencing SAX: a novel symbolic representation of time series
Many high level representations of time series have been proposed for data mining, including Fourier transforms, wavelets, eigenwaves, piecewise polynomial models etc. Many researc...
Jessica Lin, Eamonn J. Keogh, Li Wei, Stefano Lona...
UML
2005
Springer
14 years 29 days ago
Extending the Boundaries of Model-Based Development to Account for Errors
This paper presents an approach for relating informed task models and system models in the domain of safety critical interactive systems. The models, which are usually developed f...
Sandra Basnyat, Rémi Bastide, Philippe A. P...
IJCPOL
2008
117views more  IJCPOL 2008»
13 years 7 months ago
Transliterated Named Entity Recognition Based on Chinese Word Sketch
One of the unique challenges to Chinese Language Processing is cross-strait named entity recognition. Due to the adoption of different transliteration strategies, foreign name tra...
Petr Simon, Chu-Ren Huang, Shu-Kai Hsieh, Jia-Fei ...
KDD
2004
ACM
139views Data Mining» more  KDD 2004»
14 years 8 months ago
Machine learning for online query relaxation
In this paper we provide a fast, data-driven solution to the failing query problem: given a query that returns an empty answer, how can one relax the query's constraints so t...
Ion Muslea
JMLR
2006
132views more  JMLR 2006»
13 years 7 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof