Sciweavers

495 search results - page 81 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
PERCOM
2006
ACM
14 years 9 months ago
On the Fly Service Composition for Local Interaction Environments
Dynamically creating new, composite services "on the fly" using existing ones in a local interaction environment (e.g. a home, meeting room, airport lounge, etc.) presen...
Hossein Pourreza, Peter Graham
ICDM
2003
IEEE
111views Data Mining» more  ICDM 2003»
14 years 2 months ago
OP-Cluster: Clustering by Tendency in High Dimensional Space
Clustering is the process of grouping a set of objects into classes of similar objects. Because of unknownness of the hidden patterns in the data sets, the definition of similari...
Jinze Liu, Wei Wang 0010
AMKM
2003
Springer
14 years 2 months ago
Discovering, Visualizing, and Sharing Knowledge through Personalized Learning Knowledge Maps
This paper presents an agent-based approach to semantic exploration and knowledge discovery in large information spaces by means of capturing, visualizing and making usable implic...
Jasminko Novak, Michael Wurst, Monika Fleischmann,...
KDD
1997
ACM
221views Data Mining» more  KDD 1997»
14 years 1 months ago
MineSet: An Integrated System for Data Mining
MineSetTM , Silicon Graphics’ interactive system for data mining, integrates three powerful technologies: database access, analytical data mining, and data visualization. It sup...
Clifford Brunk, James Kelly, Ron Kohavi
SOCA
2008
IEEE
13 years 9 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart