Sciweavers

783 search results - page 146 / 157
» Context Consistency Management Using Ontology Based Model
Sort
View
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 7 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ISMIS
2009
Springer
14 years 1 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
PPOPP
1995
ACM
13 years 11 months ago
Optimistic Active Messages: A Mechanism for Scheduling Communication with Computation
Low-overhead message passing is critical to the performance of many applications. Active Messages[27] reduce the software overhead for message handling: messages are run as handle...
Deborah A. Wallach, Wilson C. Hsieh, Kirk L. Johns...
IFIP13
2004
13 years 8 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...
PE
2002
Springer
118views Optimization» more  PE 2002»
13 years 7 months ago
Procedures and tools for analysis of network traffic measurements
We present procedures and tools for the analysis of network traffic measurements. The tools consist of stand-alone 1 modules that implement advanced statistical analysis procedure...
Costas Courcoubetis, Vasilios A. Siris