Sciweavers

62 search results - page 6 / 13
» Role mining - revealing business roles for security administ...
Sort
View
ICIAR
2010
Springer
13 years 11 months ago
A Geometric Data Structure Applicable to Image Mining and Retrieval
Abstract. Due to improvements in image acquisition and storage technology, terabyte-sized databases of images are nowadays common. This abundance of data leads us to two basic prob...
T. Iwaszko, Mahmoud Melkemi, Lhassane Idoumghar
PERCOM
2007
ACM
14 years 7 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 2 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
ATAL
2007
Springer
14 years 1 months ago
F-trade: an agent-mining symbiont for financial services
The interaction and integration of agent technology and data mining presents prominent benefits to solve some of challenging issues in individual areas. For instance, data mining ...
Longbing Cao, Chengqi Zhang
WWW
2010
ACM
13 years 7 months ago
Mining advertiser-specific user behavior using adfactors
Consider an online ad campaign run by an advertiser. The ad serving companies that handle such campaigns record users' behavior that leads to impressions of campaign ads, as ...
Nikolay Archak, Vahab S. Mirrokni, S. Muthukrishna...