Results 1 - 10
of
9,361
Data Preparation for Mining World Wide Web Browsing Patterns
- KNOWLEDGE AND INFORMATION SYSTEMS
, 1999
"... The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of tra#c and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating through a Web site have increased along with this growth. An i ..."
Abstract
-
Cited by 567 (43 self)
- Add to MetaCart
. An important input to these design tasks is the analysis of how a Web site is being used. Usage analysis includes straightforward statistics, such as page access frequency, as well as more sophisticated forms of analysis, such as finding the common traversal paths through a Web site. Web Usage Mining
An intrusion-detection model
- IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract
-
Cited by 639 (0 self)
- Add to MetaCart
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns
Querying Heterogeneous Information Sources Using Source Descriptions
, 1996
"... We witness a rapid increase in the number of structured information sources that are available online, especially on the WWW. These sources include commercial databases on product information, stock market information, real estate, automobiles, and entertainment. We would like to use the data stored ..."
Abstract
-
Cited by 724 (34 self)
- Add to MetaCart
We witness a rapid increase in the number of structured information sources that are available online, especially on the WWW. These sources include commercial databases on product information, stock market information, real estate, automobiles, and entertainment. We would like to use the data
Generating Representative Web Workloads for Network and Server Performance Evaluation
, 1997
"... One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web worklo ..."
Abstract
-
Cited by 944 (11 self)
- Add to MetaCart
One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web
A Bayesian approach to filtering junk E-mail
- PAPERS FROM THE 1998 WORKSHOP, AAAI
, 1998
"... In addressing the growing problem of junk E-mail on the Internet, we examine methods for the automated construction of filters to eliminate such unwanted messages from a user’s mail stream. By casting this problem in a decision theoretic framework, we are able to make use of probabilistic learning m ..."
Abstract
-
Cited by 545 (6 self)
- Add to MetaCart
of this problem in addition to the raw text of E-mail messages, we can produce much more accurate filters. Finally, we show the efficacy of such filters in a real world usage scenario, arguing that this technology is mature enough for deployment.
UCSF Chimera—a visualization system for exploratory research and analysis
- J. Comput. Chem
, 2004
"... Abstract: The design, implementation, and capabilities of an extensible visualization system, UCSF Chimera, are discussed. Chimera is segmented into a core that provides basic services and visualization, and extensions that provide most higher level functionality. This architecture ensures that the ..."
Abstract
-
Cited by 504 (7 self)
- Add to MetaCart
and analysis of volumetric data. A discussion of the usage of Chimera in real-world situations is given, along with anticipated future directions. Chimera includes full user documentation, is free to academic and nonprofit users, and is available for Microsoft Windows,
The Case for Energy-Proportional Computing
"... Energy-proportional designs would enable large energy savings in servers, potentially doubling their efficiency in real-life use. Achieving energy proportionality will require significant improvements in the energy usage profile of every system component, particularly the memory and disk subsystems. ..."
Abstract
-
Cited by 469 (2 self)
- Add to MetaCart
Energy-proportional designs would enable large energy savings in servers, potentially doubling their efficiency in real-life use. Achieving energy proportionality will require significant improvements in the energy usage profile of every system component, particularly the memory and disk subsystems
Back to Bentham? Explorations of Experienced Utility
- QUARTERLY JOURNAL OF ECONOMICS
, 1997
"... Two core meanings of “utility” are distinguished. “Decision utility” is the weight of an outcome in a decision. “Experienced utility” is hedonic quality, as in Bentham’s usage. Experienced utility can be reported in real time (instant utility), or in retrospective evaluations of past episodes (remem ..."
Abstract
-
Cited by 429 (28 self)
- Add to MetaCart
Two core meanings of “utility” are distinguished. “Decision utility” is the weight of an outcome in a decision. “Experienced utility” is hedonic quality, as in Bentham’s usage. Experienced utility can be reported in real time (instant utility), or in retrospective evaluations of past episodes
Monetary policy and asset price volatility
- CHALLENGES FOR MONETARY POLICY, PROCEEDINGS OF THE 19 TH JACKSON HOLE CONFERENCE
, 1999
"... During the past 20 years, the world’s major central banks have been largely successful at bringing inflation under control. Although it is premature to suggest that inflation is no longer an issue of great concern, it is quite conceivable that the next battles facing central bankers will lie on a di ..."
Abstract
-
Cited by 407 (6 self)
- Add to MetaCart
-bust cycles in the prices of equity and real estate in a number of industrialized countries during the 1980s. Notable examples include the United States,
Loss Aversion and Seller Behavior: Evidence from the Housing Market,” Wharton School,
, 2000
"... Data from downtown Boston in the 1990s show that loss aversion determines seller behavior in the housing market. Condominium owners subject to nominal losses 1) set higher asking prices of 25-35 percent of the difference between the property's expected selling price and their original purchase ..."
Abstract
-
Cited by 372 (5 self)
- Add to MetaCart
) losses and help explain the positive price-volume correlation in real estate markets.
Results 1 - 10
of
9,361