Sciweavers

3370 search results - page 474 / 674
» Correlation Embedding Analysis
Sort
View
ISSTA
2006
ACM
14 years 4 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
CINQ
2004
Springer
189views Database» more  CINQ 2004»
14 years 4 months ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
BMCBI
2007
151views more  BMCBI 2007»
13 years 11 months ago
A statistical method to incorporate biological knowledge for generating testable novel gene regulatory interactions from microar
Background: The incorporation of prior biological knowledge in the analysis of microarray data has become important in the reconstruction of transcription regulatory networks in a...
Peter Larsen, Eyad Almasri, Guanrao Chen, Yang Dai
DATAMINE
2008
137views more  DATAMINE 2008»
13 years 11 months ago
Two heads better than one: pattern discovery in time-evolving multi-aspect data
Abstract. Data stream values are often associated with multiple aspects. For example, each value observed at a given time-stamp from environmental sensors may have an associated ty...
Jimeng Sun, Charalampos E. Tsourakakis, Evan Hoke,...
SIGKDD
2008
125views more  SIGKDD 2008»
13 years 10 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun