Scott Buffett

According to our database1, Scott Buffett authored at least 37 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Towards a robust and trustworthy machine learning system development: An engineering perspective.
J. Inf. Secur. Appl., 2022

TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
Towards a Robust and Trustworthy Machine Learning System Development.
CoRR, 2021

2020
Dramatically Reducing Search for High Utility Sequential Patterns by Maintaining Candidate Lists.
Inf., 2020

Incremental Sequential Rule Mining with Streaming Input Traces.
Proceedings of the Advances in Artificial Intelligence, 2020

2018
Pattern-Based Behavioural Analysis on Neurosurgical Simulation Data.
Proceedings of the Machine Learning for Healthcare Conference, 2018

Candidate List Maintenance in High Utility Sequential Pattern Mining.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2016
Analysing and Refining Pilot Training.
Proceedings of the 9th International Conference on Educational Data Mining, 2016

2015
Analyzing Student Inquiry Data Using Process Discovery and Sequence Classification.
Proceedings of the 8th International Conference on Educational Data Mining, 2015

2013
Maintaining Preference Networks That Adapt to Changing Preferences.
Proceedings of the Advances in Artificial Intelligence, 2013

2012
Simulating social commerce applied to buyer group pricing, recommendation incentives, and bundling.
Proceedings of the Fourteenth International Conference on Electronic Commerce, 2012

2011
Utility Estimation in Large Preference Graphs Using A* Search.
Proceedings of the Advances in Artificial Intelligence, 2011

2010
Using classification methods to label tasks in process mining.
J. Softw. Maintenance Res. Pract., 2010

2009
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009

2008
Special section guest editors' introduction: Evaluating new technological innovations for successful business on the internet.
Electron. Commer. Res. Appl., 2008

Abductive Workflow Mining Using Binary Resolution on Task Successor Rules.
Proceedings of the Rule Representation, 2008

Private Data Discovery for Privacy Compliance in Collaborative Environments.
Proceedings of the Cooperative Design, 2008

Abductive Workflow Mining.
Proceedings of the Business Process Management Workshops, 2008

Bayesian Classification of Events for Task Labeling Using Workflow Models.
Proceedings of the Business Process Management Workshops, 2008

Predicting User Preferences Via Similarity-Based Clustering.
Proceedings of the Advances in Artificial Intelligence , 2008

2007
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services.
Int. J. Inf. Sec., 2007

A Bayesian classifier for learning opponents' preferences in multi-object automated negotiation.
Electron. Commer. Res. Appl., 2007

Persistently Effective Query Selection in Preference Elicitation.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

Private Data Management in Collaborative Environments.
Proceedings of the Cooperative Design, 2007

Reasoning with Conditional Preferences Across Attributes.
Proceedings of the Advances in Artificial Intelligence, 2007

2006
Towards a model for risk and consent management of personal health information.
Proceedings of the 2006 International Conference on Privacy, 2006

TAC-REM - The Real Estate Market Game: A Proposal for the Trading Agent Competition.
Proceedings of the Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, 2006

Detecting opponent concessions in multi-issue automated negotiation.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce.
Proceedings of the Third Annual Conference on Privacy, 2005

A Markov Model for Inventory Level Optimization in Supply-Chain Management.
Proceedings of the Advances in Artificial Intelligence, 2005

Learning opponents' preferences in multi-object automated negotiation.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
A Decision Procedure for Bundle Purchasing with Incomplete Information on Future Prices.
Int. J. Electron. Commer., 2004

Negotiating Exchanges of P3p-Labeled Information for Compensation.
Comput. Intell., 2004

Determining Internet Users' Values for Private Information.
Proceedings of the Second Annual Conference on Privacy, 2004

A Decision-Theoretic Algorithm for Bundle Purchasing in Multiple Open Ascending-Price Auctions.
Proceedings of the Advances in Artificial Intelligence, 2004

Considering expected utility of future bidding options in bundle purchasing with multiple auctions.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Efficient Monte Carlo decision tree solution in dynamic purchasing environments.
Proceedings of the 5th International Conference on Electronic Commerce, 2003


  Loading...