Sciweavers

838 search results - page 78 / 168
» Data Mining by Navigation - An Experience with Systems Biolo...
Sort
View
CCS
2009
ACM
14 years 5 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
13 years 8 months ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
14 years 5 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
JUCS
2007
118views more  JUCS 2007»
13 years 10 months ago
A Model of Immune Gene Expression Programming for Rule Mining
: Rule mining is an important issue in data mining. To address it, a novel Immune Gene Expression Programming (IGEP) model was proposed. Concepts of rule, gene, immune cell, and an...
Tao Zeng, Changjie Tang, Yong Xiang, Peng Chen, Yi...
DPD
2002
125views more  DPD 2002»
13 years 10 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung