Sciweavers

2058 search results - page 59 / 412
» Trajectory pattern mining
Sort
View
140
Voted
IDEAL
2010
Springer
15 years 16 days ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
DASFAA
2010
IEEE
165views Database» more  DASFAA 2010»
15 years 6 months ago
Towards an Algebraic Framework for Querying Inductive Databases
Abstract. In this paper, we present a theoretical foundation for querying inductive databases, which can accommodate disparate mining tasks. We present a data mining algebra includ...
Hong-Cheu Liu, Aditya Ghose, John Zeleznikow
125
Voted
KBSE
2009
IEEE
15 years 9 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie
145
Voted
ICDM
2002
IEEE
131views Data Mining» more  ICDM 2002»
15 years 7 months ago
Using Sequential and Non-Sequential Patterns in Predictive Web Usage Mining Tasks
We describe an efficient framework for Web personalization based on sequential and non-sequential pattern discovery from usage data. Our experimental results performed on real us...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...
152
Voted
GRC
2010
IEEE
15 years 3 months ago
Local Pattern Mining from Sequences Using Rough Set Theory
Abstract--Sequential pattern mining is a crucial but challenging task in many applications, e.g., analyzing the behaviors of data in transactions and discovering frequent patterns ...
Ken Kaneiwa, Yasuo Kudo