Sciweavers

2071 search results - page 250 / 415
» Behaviour Management in Database Applications
Sort
View
WORDS
2005
IEEE
15 years 8 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
ICARCV
2002
IEEE
116views Robotics» more  ICARCV 2002»
15 years 7 months ago
Content-based image retrieval in surface inspection
In this paper a prototype system is described for the management and content-based retrieval of defect images in huge image databases. This is a real problem in surface inspection...
Jukka Iivarinen, Jussi Pakkanen, Juhani Rauhamaa
123
Voted
WWW
2004
ACM
16 years 3 months ago
On mining webclick streams for path traversal patterns
Mining user access patterns from a continuous stream of Web-clicks presents new challenges over traditional Web usage mining in a large static Web-click database. Modeling user ac...
Hua-Fu Li, Suh-Yin Lee, Man-Kwan Shan
129
Voted
KDD
2006
ACM
198views Data Mining» more  KDD 2006»
16 years 3 months ago
CFI-Stream: mining closed frequent itemsets in data streams
Mining frequent closed itemsets provides complete and condensed information for non-redundant association rules generation. Extensive studies have been done on mining frequent clo...
Nan Jiang, Le Gruenwald
96
Voted
KDD
2006
ACM
142views Data Mining» more  KDD 2006»
16 years 3 months ago
Automatic mining of fruit fly embryo images
We present FEMine, an automatic system for image-based gene expression analysis. We perform experiments on the largest publicly available collection of Drosophila ISH (in situ hyb...
Jia-Yu Pan, André G. R. Balan, Eric P. Xing...