Sciweavers

76 search results - page 12 / 16
» Mining Sequential Patterns with Regular Expression Constrain...
Sort
View
IDA
2005
Springer
14 years 1 months ago
From Local Pattern Mining to Relevant Bi-cluster Characterization
Clustering or bi-clustering techniques have been proved quite useful in many application domains. A weakness of these techniques remains the poor support for grouping characterizat...
Ruggero G. Pensa, Jean-François Boulicaut
INFSOF
2007
83views more  INFSOF 2007»
13 years 7 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
KDD
1999
ACM
185views Data Mining» more  KDD 1999»
13 years 12 months ago
User-Driven Navigation Pattern Discovery from Internet Data
Managers of electronic commerce sites need to learn as much as possible about their customers and those browsing their virtual premises, in order to maximise the return on marketin...
Matthias Baumgarten, Alex G. Büchner, Sarabjo...
SCP
2010
96views more  SCP 2010»
13 years 6 months ago
Enforcing structural regularities in software using IntensiVE
The design and implementation of a software system is often governed by a variety of coding conventions, design patterns, architectural guidelines, design rules, and other so-call...
Johan Brichau, Andy Kellens, Sergio Castro, Theo D...
SPIRE
2005
Springer
14 years 1 months ago
Classifying Sentences Using Induced Structure
In this article we will introduce a new approach (and several implementations) to the task of sentence classification, where pre-defined classes are assigned to sentences. This a...
Menno van Zaanen, Luiz Augusto Sangoi Pizzato, Die...