G Pyun, U Yun - Applied intelligence, 2014 - Springer
Top-k frequent pattern mining finds interesting patterns from the highest support to the k-th support. The approach can be effectively applied in numerous fields such as marketing …
Event logs are often one of the main sources of information to understand the behavior of a system. While numerous approaches have extracted partial information from event logs, in …
An effective approach to gather cyber threat intelligence is to collect and analyze traffic destined to unused Internet addresses known as darknets. In this paper, we elaborate on …
P López Cueva, A Bertaux, A Termier… - Proceedings of the …, 2012 - dl.acm.org
Increasing complexity in both the software and the underlying hardware, and ever tighter time-to-market pressures are some of the key challenges faced when designing multimedia …
U Yun, G Pyun, E Yoon - International Journal on Artificial …, 2015 - World Scientific
Sequential pattern mining has become one of the most important topics in data mining. It has broad applications such as analyzing customer purchase data, Web access patterns …
S Lagraa, A Termier, F Pétrot - … & Test in Europe Conference & …, 2013 - ieeexplore.ieee.org
Due to a growing need for flexibility, massively parallel Multiprocessor SoC (MPSoC) architectures are currently being developed. This leads to the need for parallel software, but …
C Kamdem Kengne, LC Fopa, A Termier… - Proceedings of the 19th …, 2013 - dl.acm.org
The analysis of multimedia application traces can reveal important information to enhance program execution comprehension. However typical size of traces can be in gigabytes …
J Zou, M Zhao, J Shi, C Wang - 36th Intl. Conf. on Massive Storage …, 2021 - par.nsf.gov
T his pa per st u dies t he a ut om atic o pti miz ati on of d at a pl ace me nt p ar a meters f or t he i nter-j ob write o nce re adma ny (WORM) sce n ari ow here d at a is first m ateri alize dto …