Sciweavers

71 search results - page 11 / 15
» Distilling Scenarios from Patterns for Software Architecture...
Sort
View
KDD
2005
ACM
106views Data Mining» more  KDD 2005»
14 years 6 days ago
Enhancing the lift under budget constraints: an application in the mutual fund industry
A lift curve, with the true positive rate on the y-axis and the customer pull (or contact) rate on the x-axis, is often used to depict the model performance in many data mining ap...
Lian Yan, Michael Fassino, Patrick Baldasare
KDD
2006
ACM
222views Data Mining» more  KDD 2006»
14 years 7 months ago
A component-based framework for knowledge discovery in bioinformatics
Motivation: In the field of bioinformatics there is an emerging need to integrate all knowledge discovery steps into a standardized modular framework. Indeed, component-based deve...
Julien Etienne, Bernd Wachmann, Lei Zhang
ICICS
2005
Springer
14 years 7 days ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
KDD
2005
ACM
106views Data Mining» more  KDD 2005»
14 years 7 months ago
Simultaneous optimization of complex mining tasks with a knowledgeable cache
With an increasing use of data mining tools and techniques, we envision that a Knowledge Discovery and Data Mining System (KDDMS) will have to support and optimize for the followi...
Ruoming Jin, Kaushik Sinha, Gagan Agrawal
DRM
2006
Springer
13 years 10 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...