Sciweavers

7163 search results - page 1359 / 1433
» Privacy-Preserving Data Mining
Sort
View
VLDB
2001
ACM
100views Database» more  VLDB 2001»
14 years 3 months ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
VLDB
1998
ACM
95views Database» more  VLDB 1998»
14 years 3 months ago
RainForest - A Framework for Fast Decision Tree Construction of Large Datasets
Classification of large datasets is an important data mining problem. Many classification algorithms have been proposed in the literature, but studies have shown that so far no al...
Johannes Gehrke, Raghu Ramakrishnan, Venkatesh Gan...
VISUALIZATION
1997
IEEE
14 years 3 months ago
Global tele-immersion
The term Tele-Immersion was first used in October 1996 as the title of a workshop the Electronic Visualization Laboratory (EVL) at University of Illinois at Chicago (UIC) organize...
Thomas A. DeFanti
CIBCB
2007
IEEE
14 years 3 months ago
Genetic Regulatory Network Modeling Using Network Component Analysis and Fuzzy Clustering
Gene regulatory network model is the most widely used mechanism to model and predict the behavior of living organisms. Network Component Analysis (NCA) as an emerging issue for unc...
Fatemeh Bakouie, Mohammad Hassan Moradi
DSN
2007
IEEE
14 years 3 months ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...
« Prev « First page 1359 / 1433 Last » Next »