Sciweavers

76 search results - page 10 / 16
» Analysis of Firewall Policy Rules Using Data Mining Techniqu...
Sort
View
ICDM
2003
IEEE
153views Data Mining» more  ICDM 2003»
13 years 12 months ago
Dimensionality Reduction Using Kernel Pooled Local Discriminant Information
We study the use of kernel subspace methods for learning low-dimensional representations for classification. We propose a kernel pooled local discriminant subspace method and com...
Peng Zhang, Jing Peng, Carlotta Domeniconi
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 8 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 7 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
IJMI
2007
140views more  IJMI 2007»
13 years 6 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ADVIS
2004
Springer
14 years 3 days ago
Multiple Sets of Rules for Text Categorization
An important issue in text mining is how to make use of multiple pieces knowledge discovered to improve future decisions. In this paper, we propose a new approach to combining mult...
Yaxin Bi, Terry J. Anderson, Sally I. McClean