@article{phillips2000introduction, abstract = {On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing-as opposed to eliminating-fraud. Likewise, completely replacing an existing security system with a biometric-based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testing}, author = {Phillips, P.J. and Martin, A. and Wilson, C.L. and Przybocki, M.}, doi = {10.1109/2.820040}, interhash = {566f7a9e16fbd8437907e9ba2a34bb4b}, intrahash = {b84d37310fed293b821c56b00b3bfb36}, issn = {0018-9162}, journal = {Computer}, month = feb, number = 2, pages = {56-63}, title = {An introduction evaluating biometric systems}, volume = 33, year = 2000 } @article{atzmueller2013exploratory, author = {Atzmueller, Martin and Lemmerich, Florian}, interhash = {6e83bf4017fffe31a5632289d91c1b6d}, intrahash = {9f176520035c05191d77ebd53803b817}, journal = {International Journal of Web Science (Special Issue on Social Web Search and Mining)}, number = {1/2}, title = {{Exploratory Pattern Mining on Social Media using Geo-References and Social Tagging Information}}, volume = 2, year = 2013 } @incollection{seipel2013mining, address = {Heidelberg, Germany}, author = {Seipel, Dietmar and Köhler, Stefan and Neubeck, Philipp and Atzmueller, Martin}, booktitle = {{Postproceedings of the 1st Workshop on New Frontiers in Mining Complex Patterns (NFMCP 2012}}, interhash = {5c349ddd3d5627b0ccb31ee1de55faa2}, intrahash = {0c1b2ffe552535d3f34521a74f4c4253}, publisher = {Springer Verlag}, series = {LNAI}, title = {{Mining Complex Event Patterns in Computer Networks}}, year = 2013 } @article{ivncsy2006frequent, abstract = {Abstract: Frequent pattern mining is a heavily researched area in the field of data mining with wide range of applications. One of them is to use frequent pattern discovery methods in Web log data. Discovering hidden information from Web log data is called Web usage mining. The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. This can be used for advertising purposes, for creating dynamic user profiles etc. In this paper three pattern mining approaches are investigated from the Web usage mining point of view. The different patterns in Web log mining are page sets, page sequences and page graphs.}, author = {Iváncsy, Renáta and Vajk, István}, interhash = {5612ed1c8203908fb94adf7ad8304e12}, intrahash = {f29f4627c9ae99370fc7ba005982e2e6}, journal = {Acta Polytechnica Hungarica}, number = 1, title = {Frequent Pattern Mining in Web Log Data}, url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4559}, volume = 3, year = 2006 } @inproceedings{AL:12a, address = {Heidelberg, Germany}, author = {Atzmueller, Martin and Lemmerich, Florian}, booktitle = {Proc. ECML/PKDD 2012: European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases. accepted}, interhash = {6f00bb468dbc49b2adf426302bcf39f6}, intrahash = {e2aac1cdeabeeb4568e2ef4ffe9464d2}, publisher = {Springer Verlag}, title = {{VIKAMINE - Open-Source Subgroup Discovery, Pattern Mining, and Analytics}}, url = {http://www.kde.cs.uni-kassel.de/atzmueller/paper/atzmueller-vikamine2-ecml-pkdd-2012.pdf}, year = 2012 } @inproceedings{SNKA:12, address = {Bristol, UK}, author = {Seipel, Dietmar and Neubeck, Philipp and Köhler, Stefan and Atzmueller, Martin}, booktitle = {Proc. ECML/PKDD Workshop on New Frontiers in Mining Complex Patterns}, interhash = {6ddaf3fd7606e39482a97cbce7a01892}, intrahash = {e80737788c869221f272dd9af03acecf}, title = {{Mining Complex Event Patterns in Computer Networks}}, year = 2012 } @article{jansen2009patterns, abstract = {Query reformulation is a key user behavior during Web search. Our research goal is to develop predictive models of query reformulation during Web searching. This article reports results from a study in which we automatically classified the query-reformulation patterns for 964,780 Web searching sessions, composed of 1,523,072 queries, to predict the next query reformulation. We employed an n-gram modeling approach to describe the probability of users transitioning from one query-reformulation state to another to predict their next state. We developed first-, second-, third-, and fourth-order models and evaluated each model for accuracy of prediction, coverage of the dataset, and complexity of the possible pattern set. The results show that Reformulation and Assistance account for approximately 45% of all query reformulations; furthermore, the results demonstrate that the first- and second-order models provide the best predictability, between 28 and 40% overall and higher than 70% for some patterns. Implications are that the n-gram approach can be used for improving searching systems and searching assistance.}, author = {Jansen, Bernard J. and Booth, Danielle L. and Spink, Amanda}, doi = {10.1002/asi.21071}, interhash = {c72cb0657de6b51a3dc120521c64626d}, intrahash = {beb7d932ce7da2665184e5b3d933b8fa}, issn = {1532-2890}, journal = {Journal of the American Society for Information Science and Technology}, month = mar, number = 7, pages = {1358--1371}, publisher = {Wiley Subscription Services, Inc.}, title = {Patterns of query reformulation during Web searching}, url = {http://dx.doi.org/10.1002/asi.21071}, volume = 60, year = 2009 } @inproceedings{hearst1992automatic, abstract = {We describe a method for the automatic acquisition of the hyponymy lexical relation from unrestricted text. Two goals motivate the approach: (i) avoidance of the need for pre-encoded knowledge and (ii) applicability across a wide range of text. We identify a set of lexico-syntactic patterns that are easily recognizable, that occur frequently and across text genre boundaries, and that indisputably indicate the lexical relation of interest. We describe a method for discovering these patterns and suggest that other lexical relations will also be acquirable in this way. A subset of the acquisition algorithm is implemented and the results are used to augment and critique the structure of a large hand-built thesaurus. Extensions and applications to areas such as information retrieval are suggested.}, acmid = {992154}, address = {Stroudsburg, PA, USA}, author = {Hearst, Marti A.}, booktitle = {Proceedings of the 14th conference on Computational linguistics}, doi = {10.3115/992133.992154}, interhash = {8c1e90c6cc76625c34f20370a1af7ea2}, intrahash = {2c49ad19ac6977bd806b6687e4dcc550}, location = {Nantes, France}, numpages = {7}, pages = {539--545}, publisher = {Association for Computational Linguistics}, title = {Automatic acquisition of hyponyms from large text corpora}, url = {http://dx.doi.org/10.3115/992133.992154}, volume = 2, year = 1992 } @inproceedings{hoffmann2012patternbased, address = {Chicago, Illinois, USA}, author = {Hoffmann, A.}, booktitle = {20th IEEE International Requirements Engineering Conference Doctoral Symposium (RE 2012 DS)}, interhash = {da18d26e68947e168800cf4872cc95ed}, intrahash = {261e9c3da0c83bbd99d141e8746a30dc}, title = {A Pattern-Based Approach for Analysing Requirements in Socio-technical Systems Engineering}, year = 2012 } @inproceedings{hoffmann2012anforderungen, address = {Braunschweig, Germany}, author = {Hoffmann, A. and Hoffmann, H. and Leimeister, J. M.}, booktitle = {42. Jahrestagung der Gesellschaft für Informatik e.V. (GI)}, interhash = {bbb8696427f9c021b04d75300bd35f60}, intrahash = {b45212287d0aa59c48af7e2fca9b5f3f}, note = 350, title = {Anforderungen an Software Requirement Pattern in der Entwicklung sozio-technischer Systeme}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_353.pdf}, year = 2012 } @inproceedings{hoffmann2012pattern, address = {Barcelona, Spain}, author = {Hoffmann, A.}, booktitle = {20th European Conference on Information Systems Doctoral Consortium (ECIS 2012 DC)}, interhash = {da18d26e68947e168800cf4872cc95ed}, intrahash = {1f8b8b81e1295dc34e1e34b9adaa678e}, note = 329, title = {A pattern based approach for analysing requirements in socio-technical systems engineering}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_400.pdf}, year = 2012 } @inproceedings{ls_leimeister, address = {Barcelona, Spanien}, author = {Hoffmann, A. and Söllner, M. and Hoffmann, H.}, booktitle = {20th European Conference on Information Systems (ECIS)}, interhash = {db95fde6b4b76f22d8c7177261e9729e}, intrahash = {010de0f71263ba534893d085d030d9df}, note = 324, title = {Twenty software requirement patterns to specify recommender systems that users will trust}, url = {http://pubs.wi-kassel.de/wp-content/uploads/2013/03/JML_399.pdf}, year = 2012 } @inproceedings{atzmueller2011towards, author = {Atzmueller, Martin and Benz, Dominik and Hotho, Andreas and Stumme, Gerd}, booktitle = {Proceedings of the 4th international workshop on Social Data on the Web (SDoW2011)}, editor = {Passant, Alexandre and Fernández, Sergio and Breslin, John and Bojārs, Uldis}, interhash = {65222f0ccc23063a2a15c0a7fd5513a0}, intrahash = {a47a41658592202811f0139d4bb65871}, title = {Towards Mining Semantic Maturity in Social Bookmarking Systems}, url = {http://www.kde.cs.uni-kassel.de/pub/pdf/atzmueller2011towards.pdf}, year = 2011 } @inproceedings{LA:10, author = {Lemmerich, Florian and Atzmueller, Martin}, booktitle = {Proc. 23rd FLAIRS Conference}, interhash = {60aec4cb1288ac3b10cac5941a24bd90}, intrahash = {15793feea44048a02344592d85f797a2}, title = {Fast Discovery of Relevant Subgroup Patterns}, year = 2010 } @inproceedings{atzmueller2011vikamine, author = {Atzmueller, Martin and Lemmerich, Florian}, booktitle = {Proceedings of the LWA 2011 - Learning, Knowledge, Adaptation}, interhash = {79b076947a2b7c00e234adf840a7636c}, intrahash = {56521f54efa8a332927a512bafcd8042}, title = {VIKAMINE - A Rich-Client Environment for Intelligent Pattern Mining and Subgroup Discovery}, year = 2011 } @inproceedings{atzmueller2011towards, author = {Atzmueller, Martin and Benz, Dominik and Hotho, Andreas and Stumme, Gerd}, booktitle = {Proceedings of the 4th international workshop on Social Data on the Web (SDoW2011)}, editor = {Passant, Alexandre and Fernández, Sergio and Breslin, John and Bojars, Uldis}, interhash = {65222f0ccc23063a2a15c0a7fd5513a0}, intrahash = {46119d149e72a77972b025899aa3a94f}, title = {Towards Mining Semantic Maturity in Social Bookmarking Systems}, url = {http://www.kde.cs.uni-kassel.de/pub/pdf/atzmueller2011towards.pdf}, year = 2011 } @inproceedings{LA:11MSM, author = {Lemmerich, Florian and Atzmueller, Martin}, booktitle = {Proc. IEEE SocialCom 2011, Workshop on Modeling Social Media (MSM 2011)}, interhash = {c2b76c00f7f484d6f46b361a9f0336cf}, intrahash = {222ccbe9b3a900091c4148e2a93fff81}, publisher = {IEEE Computer Society}, title = {Modeling Location-Based Profiles of Social Image Media using Explorative Pattern Mining}, year = 2011 } @book{gamma1994design, asin = {0201633612}, author = {Gamma, Erich and Helm, Richard and Johnson, Ralph E.}, dewey = {005.12}, ean = {9780201633610}, edition = {1st ed., Reprint.}, interhash = {538f15d7e6e935d65579775dfe8b6ddd}, intrahash = {86f0f1f1b5899d2594317169583391ce}, isbn = {0201633612}, publisher = {Addison-Wesley Longman, Amsterdam}, title = {Design Patterns. Elements of Reusable Object-Oriented Software.}, url = {http://www.amazon.de/Patterns-Elements-Reusable-Object-Oriented-Software/dp/0201633612/ref=sr_1_1?ie=UTF8&qid=1302724786&sr=8-1}, year = 1994 } @article{golder2006usage, abstract = {Collaborative tagging describes the process by which many users add metadata in the form of keywords to shared content. Recently, collaborative tagging has grown in popularity on the web, on sites that allow users to tag bookmarks, photographs and other content. In this paper we analyze the structure of collaborative tagging systems as well as their dynamic aspects. Specifically, we discovered regularities in user activity, tag frequencies, kinds of tags used, bursts of popularity in bookmarking and a remarkable stability in the relative proportions of tags within a given URL. We also present a dynamic model of collaborative tagging that predicts these stable patterns and relates them to imitation and shared knowledge.}, author = {Golder, Scott A. and Huberman, Bernardo A.}, doi = {10.1177/0165551506062337}, eprint = {http://jis.sagepub.com/cgi/reprint/32/2/198.pdf}, file = {golder2006usage.pdf:golder2006usage.pdf:PDF}, interhash = {df675e16fcba9cd0f6afc5c9f2a8a723}, intrahash = {f67d3599f5282425b8e0e5b383d436a0}, journal = {Journal of Information Science}, number = 2, pages = {198--208}, title = {Usage patterns of collaborative tagging systems}, url = {http://jis.sagepub.com/cgi/content/abstract/32/2/198}, volume = 32, year = 2006 } @book{Shawe:2004, address = {Cambridge, UK}, author = {Shawe-Taylor, John and Cristianini, Nello}, interhash = {ba08fe16ecfaaef17b41d9e432a4341e}, intrahash = {1d17b9d54a4ef23864227f647622d071}, publisher = {Cambridge University Press}, title = {Kernel Methods for Pattern Analysis}, year = 2004 }