• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 384,822
Next 10 →

From data mining to knowledge discovery in databases

by Usama Fayyad, Gregory Piatetsky-shapiro, Padhraic Smyth - AI Magazine , 1996
"... ■ Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. What is all the excitement about? This article provides an overview of this emerging field, clarifying how data mining and knowledge discovery in databases ..."
Abstract - Cited by 510 (0 self) - Add to MetaCart
■ Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. What is all the excitement about? This article provides an overview of this emerging field, clarifying how data mining and knowledge discovery

Lightweight causal and atomic group multicast

by Kenneth Birman, Andre Schiper, Pat Stephenson - ACM TRANSACTIONS ON COMPUTER SYSTEMS , 1991
"... ..."
Abstract - Cited by 622 (49 self) - Add to MetaCart
Abstract not found

An intrusion-detection model

by Dorothy E. Denning - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract - Cited by 632 (0 self) - Add to MetaCart
of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular

Earthquake Shakes Twitter Users: Real-time Event Detection by Social Sensors

by Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo - In Proceedings of the Nineteenth International WWW Conference (WWW2010). ACM , 2010
"... Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occurs, people make many Twitter posts (tweets) related to the earthquake, which enables detection of earthquake occurrence ..."
Abstract - Cited by 484 (3 self) - Add to MetaCart
such as the keywords in a tweet, the number of words, and their context. Subsequently, we produce a probabilistic spatiotemporal model for the target event that can find the center and the trajectory of the event location. We consider each Twitter user as a sensor and apply Kalman filtering and particle filtering

Knowledge Discovery in Databases: an Overview

by William J. Frawley, Gregory Piatetsky-shapiro, Christopher J. Matheus , 1992
"... this article. 0738-4602/92/$4.00 1992 AAAI 58 AI MAGAZINE for the 1990s (Silberschatz, Stonebraker, and Ullman 1990) ..."
Abstract - Cited by 470 (3 self) - Add to MetaCart
this article. 0738-4602/92/$4.00 1992 AAAI 58 AI MAGAZINE for the 1990s (Silberschatz, Stonebraker, and Ullman 1990)

Modeling Strategic Relationships for Process Reengineering

by Eric Siu-kwong Yu , 1995
"... Existing models for describing a process (such as a business process or a software development process) tend to focus on the \what " or the \how " of the process. For example, a health insurance claim process would typically be described in terms of a number of steps for assessing and appr ..."
Abstract - Cited by 545 (40 self) - Add to MetaCart
Existing models for describing a process (such as a business process or a software development process) tend to focus on the \what " or the \how " of the process. For example, a health insurance claim process would typically be described in terms of a number of steps for assessing

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW

by Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, Fred D. Davis , 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract - Cited by 1665 (9 self) - Add to MetaCart
acceptance model and the theory of planned behavior, the model of PC utilization, the innovation diffusion theory, and the social cognitive theory. Using data from four organizations over a six-month period with three points of measurement, the eight models explained between 17 percent and 53 percent

The SWISS-MODEL Workspace: A web-based environment for protein structure homology modelling

by Konstantin Arnold, Lorenza Bordoli, Torsten Schwede, et al. - BIOINFORMATICS , 2005
"... Motivation: Homology models of proteins are of great interest for planning and analyzing biological experiments when no experimental three-dimensional structures are available. Building homology models requires specialized programs and up-to-date sequence and structural databases. Integrating all re ..."
Abstract - Cited by 555 (5 self) - Add to MetaCart
dedicated to protein structure homology modelling. It assists and guides the user in building protein homology models at different levels of complexity. A personal working environment is provided for each user where several modelling projects can be carried out in parallel. Protein sequence and structure

Charting Past, Present and Future Research in Ubiquitous Computing

by Gregory D. Abowd, Elizabeth D. Mynatt - ACM Transactions on Computer-Human Interaction , 2000
"... . The proliferation ofcomputing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggests new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, applicationdriven research in ..."
Abstract - Cited by 433 (6 self) - Add to MetaCart
. The proliferation ofcomputing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggests new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, applicationdriven research

Discovery of frequent episodes in event sequences

by Heikki Mannila, Hannu Toivonen - Data Min. Knowl. Discov , 1997
"... Abstract. Sequences of events describing the behavior and actions of users or systems can be collected in several domains. An episode is a collection of events that occur relatively close to each other in a given partial order. We consider the problem of discovering frequently occurring episodes in ..."
Abstract - Cited by 355 (13 self) - Add to MetaCart
Abstract. Sequences of events describing the behavior and actions of users or systems can be collected in several domains. An episode is a collection of events that occur relatively close to each other in a given partial order. We consider the problem of discovering frequently occurring episodes
Next 10 →
Results 1 - 10 of 384,822
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University