Sciweavers

1708 search results - page 237 / 342
» Associative personal information management
Sort
View
EGOV
2004
Springer
14 years 2 months ago
Software Acquisition Based on Business Models
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
Peter Regner, Thomas Wiesinger, Josef Küng, R...
BMCBI
2007
130views more  BMCBI 2007»
13 years 9 months ago
Requirements and ontology for a G protein-coupled receptor oligomerization knowledge base
Background: G Protein-Coupled Receptors (GPCRs) are a large and diverse family of membrane proteins whose members participate in the regulation of most cellular and physiological ...
Lucy Skrabanek, Marta Murcia, Michel Bouvier, Laks...
KDD
2008
ACM
138views Data Mining» more  KDD 2008»
14 years 9 months ago
Quantitative evaluation of approximate frequent pattern mining algorithms
Traditional association mining algorithms use a strict definition of support that requires every item in a frequent itemset to occur in each supporting transaction. In real-life d...
Rohit Gupta, Gang Fang, Blayne Field, Michael Stei...
SAC
2010
ACM
14 years 3 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
WISEC
2009
ACM
14 years 3 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...