default search action
Scott Buffett
2020 – today
- 2023
- [i2]Mohammad Mamun, Scott Buffett:
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. CoRR abs/2312.07575 (2023) - 2022
- [j8]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a robust and trustworthy machine learning system development: An engineering perspective. J. Inf. Secur. Appl. 65: 103121 (2022) - [c28]Mohammad Mamun, Scott Buffett:
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. ICICS 2022: 546-565 - 2021
- [i1]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a Robust and Trustworthy Machine Learning System Development. CoRR abs/2101.03042 (2021) - 2020
- [j7]Scott Buffett:
Dramatically Reducing Search for High Utility Sequential Patterns by Maintaining Candidate Lists. Inf. 11(1): 44 (2020) - [c27]Andriy Drozdyuk, Scott Buffett, Michael W. Fleming:
Incremental Sequential Rule Mining with Streaming Input Traces. Canadian AI 2020: 79-91
2010 – 2019
- 2018
- [c26]Scott Buffett:
Candidate List Maintenance in High Utility Sequential Pattern Mining. IEEE BigData 2018: 644-652 - [c25]Scott Buffett, Catherine Pagiatakis, Di Jiang:
Pattern-Based Behavioural Analysis on Neurosurgical Simulation Data. MLHC 2018: 514-533 - 2016
- [c24]Bruno Emond, Scott Buffett, Cyril Goutte, Jaff Guo:
Analysing and Refining Pilot Training. EDM 2016: 682-687 - 2015
- [c23]Bruno Emond, Scott Buffett:
Analyzing Student Inquiry Data Using Process Discovery and Sequence Classification. EDM 2015: 412-415 - 2013
- [c22]Ki Hyang Lee, Scott Buffett, Michael W. Fleming:
Maintaining Preference Networks That Adapt to Changing Preferences. Canadian AI 2013: 89-99 - 2012
- [c21]Bruce Spencer, Scott Buffett:
Simulating social commerce applied to buyer group pricing, recommendation incentives, and bundling. ICEC 2012: 95-98 - 2011
- [c20]Henry Bediako-Asare, Scott Buffett, Michael W. Fleming:
Utility Estimation in Large Preference Graphs Using A* Search. Canadian AI 2011: 50-55 - 2010
- [j6]Scott Buffett, Liqiang Geng:
Using classification methods to label tasks in process mining. J. Softw. Maintenance Res. Pract. 22(6-7): 497-517 (2010)
2000 – 2009
- 2009
- [c19]Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin Wang, Larry Korba, Hongyu Liu, Yunli Wang:
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining. ISMIS 2009: 442-452 - 2008
- [j5]Scott Buffett, Bruce Spencer:
Special section guest editors' introduction: Evaluating new technological innovations for successful business on the internet. Electron. Commer. Res. Appl. 7(3): 262-263 (2008) - [c18]Mian Qin, Scott Buffett, Michael W. Fleming:
Predicting User Preferences Via Similarity-Based Clustering. Canadian AI 2008: 222-233 - [c17]Scott Buffett, Liqiang Geng:
Bayesian Classification of Events for Task Labeling Using Workflow Models. Business Process Management Workshops 2008: 97-108 - [c16]Scott Buffett, Bruce Hamilton:
Abductive Workflow Mining. Business Process Management Workshops 2008: 158-163 - [c15]Larry Korba, Yunli Wang, Liqiang Geng, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Hongyu Liu, Yonghua You:
Private Data Discovery for Privacy Compliance in Collaborative Environments. CDVE 2008: 142-150 - [c14]Scott Buffett:
Abductive Workflow Mining Using Binary Resolution on Task Successor Rules. RuleML 2008: 47-57 - 2007
- [j4]Scott Buffett, Bruce Spencer:
A Bayesian classifier for learning opponents' preferences in multi-object automated negotiation. Electron. Commer. Res. Appl. 6(3): 274-284 (2007) - [j3]Scott Knight, Scott Buffett, Patrick C. K. Hung:
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services. Int. J. Inf. Sec. 6(5): 285-286 (2007) - [c13]Shaoju Chen, Scott Buffett, Michael W. Fleming:
Reasoning with Conditional Preferences Across Attributes. Canadian AI 2007: 369-380 - [c12]Larry Korba, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Yunli Wang, Liqiang Geng:
Private Data Management in Collaborative Environments. CDVE 2007: 88-96 - [c11]Scott Buffett, Michael W. Fleming:
Persistently Effective Query Selection in Preference Elicitation. IAT 2007: 491-497 - 2006
- [c10]Scott Buffett, Luc Comeau, Bruce Spencer, Michael W. Fleming:
Detecting opponent concessions in multi-issue automated negotiation. ICEC 2006: 11-18 - [c9]Scott Buffett, Maria Fasli:
TAC-REM - The Real Estate Market Game: A Proposal for the Trading Agent Competition. TADA/AMEC 2006: 90-102 - [c8]Scott Buffett, T. A. Kosa:
Towards a model for risk and consent management of personal health information. PST 2006: 54 - 2005
- [c7]Scott Buffett, Bruce Spencer:
Learning opponents' preferences in multi-object automated negotiation. ICEC 2005: 300-305 - [c6]Scott Buffett:
A Markov Model for Inventory Level Optimization in Supply-Chain Management. Canadian AI 2005: 133-144 - [c5]Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer:
MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. PST 2005 - 2004
- [j2]Scott Buffett, Keping Jia, Sandy Liu, Bruce Spencer, Fang Wang:
Negotiating Exchanges of P3p-Labeled Information for Compensation. Comput. Intell. 20(4): 663-677 (2004) - [j1]Scott Buffett, Bruce Spencer:
A Decision Procedure for Bundle Purchasing with Incomplete Information on Future Prices. Int. J. Electron. Commer. 8(4): 131-144 (2004) - [c4]Scott Buffett:
Considering expected utility of future bidding options in bundle purchasing with multiple auctions. ICEC 2004: 69-76 - [c3]Scott Buffett, Alastair Grant:
A Decision-Theoretic Algorithm for Bundle Purchasing in Multiple Open Ascending-Price Auctions. Canadian AI 2004: 429-433 - [c2]Scott Buffett, Nathan Scott, Bruce Spencer, Michael Richter, Michael W. Fleming:
Determining Internet Users' Values for Private Information. PST 2004: 79-88 - 2003
- [c1]Scott Buffett, Bruce Spencer:
Efficient Monte Carlo decision tree solution in dynamic purchasing environments. ICEC 2003: 31-39
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint