Sciweavers

1109 search results - page 177 / 222
» Query Processing, Approximation, and Resource Management in ...
Sort
View
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CIKM
2009
Springer
13 years 6 months ago
A tag recommendation system for folksonomy
Social bookmarking tools become more and more popular nowadays and tagging is used to organize information and allow users to recall or search the resources. Users need to type th...
Ning Zhang, Yuan Zhang, Jie Tang
EUROSSC
2008
Springer
13 years 10 months ago
Synthesizing Context for a Sports Domain on a Mobile Device
Abstract. In ubiquitous computing environments there are an increasing number and variety of devices that can generate context data. The challenge is to timely acquire, process, an...
Alisa Devlic, Michal Koziuk, Wybe Horsman
NOSSDAV
2009
Springer
14 years 3 months ago
Power efficient real-time disk scheduling
Hard-disk drive power consumption reduction methods focus mainly on increasing the amount of time the disk is in standby mode (disk spun down) by implementing aggressive data read...
Damien Le Moal, Donald Molaro, Jorge Campello
BNCOD
2003
127views Database» more  BNCOD 2003»
13 years 10 months ago
Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining
Data mining aims at discovering important and previously unknown patterns from the dataset in the underlying database. Database mining performs mining directly on data stored in r...
P. Mishra, Sharma Chakravarthy