2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology 2008
DOI: 10.1109/wiiat.2008.354
|View full text |Cite
|
Sign up to set email alerts
|

Interaction of Agents and Data Mining in Ubiquitous Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…One example of is given in Gorodetsky et al . (2008) where seven agents communicate asynchronously by message passing according to a protocol and apply a strategic negotiation. cooperation (), when the agents contribute to a common goal. For example in Ghedini Ralha & Sarmento Silva (2012), Haider et al .…”
Section: An Ontology Of Agent Mining Approachesmentioning
confidence: 99%
“…One example of is given in Gorodetsky et al . (2008) where seven agents communicate asynchronously by message passing according to a protocol and apply a strategic negotiation. cooperation (), when the agents contribute to a common goal. For example in Ghedini Ralha & Sarmento Silva (2012), Haider et al .…”
Section: An Ontology Of Agent Mining Approachesmentioning
confidence: 99%
“…System usage datasets and streams were mined in order to profile users using various techniques including clustering based methods [35]. Various network connections were mined in order to detect anomalous connections using techniques such as fuzzy-based [36], association rules [37], classification methods [38] etc. Time series concepts were also used to analyze network data.…”
Section: During 2000smentioning
confidence: 99%
“…In Gorodetsky et. al [38], agent technology was used to assist mining processes in a ubiquitous environment.…”
Section: During 2000smentioning
confidence: 99%
See 1 more Smart Citation
“…1 One may assume that, for every agent in the protection system, the most useful information arrives not only from the agents designed to detect the attacks of the same class and detect anomalies; the information from the agents designed to detect attacks of other classes that have similar indicators can also be useful. To seek such agents, the learning mechanism with self organization can be used (see [18]). We briefly describe it here.…”
Section: Self Organization and Distributed Learningmentioning
confidence: 99%