Sciweavers

1698 search results - page 49 / 340
» The Challenge of Process Data Warehousing
Sort
View
CIDM
2009
IEEE
14 years 3 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ICDCS
2012
IEEE
11 years 11 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
INLG
2010
Springer
13 years 6 months ago
UDel: Refining a Method of Named Entity Generation
This report describes the methods and results of a system developed for the GREC Named Entity Challenge 2010. We detail the refinements made to our 2009 submission and present the...
Charles F. Greenbacker, Nicole L. Sparks, Kathleen...
ICDE
2005
IEEE
144views Database» more  ICDE 2005»
14 years 10 months ago
ViteX: A Streaming XPath Processing System
We present ViteX, an XPath processing system on XML streams with polynomial time complexity. ViteX uses a polynomial-space data structure to encode an exponential number of patter...
Yi Chen, Susan B. Davidson, Yifeng Zheng
ICDE
2007
IEEE
96views Database» more  ICDE 2007»
14 years 16 days ago
Mining Software Data
Data mining techniques and machine learning methods are commonly used in several disciplines. It is possible that they could also provide a basis for quality assessment of softwar...
Burak Turhan, F. Onur Kutlubay