Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Abstract. Diagrams that serve as a visual input facility for programming environments have to be translated into some kind of semantic description. This paper describes such a meth...
Background: A new method for the prediction of protein structural classes is constructed based on Rough Sets algorithm, which is a rule-based data mining method. Amino acid compos...
Youfang Cao, Shi Liu, Lida Zhang, Jie Qin, Jiang W...
Abstract. Folksonomies are becoming increasingly popular. They contain large amounts of data which can be mined and utilized for many tasks like visualization, browsing, informatio...
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...