Sciweavers

1232 search results - page 20 / 247
» Evaluating role mining algorithms
Sort
View
KDD
2004
ACM
103views Data Mining» more  KDD 2004»
14 years 8 months ago
An objective evaluation criterion for clustering
We propose and test an objective criterion for evaluation of clustering performance: How well does a clustering algorithm run on unlabeled data aid a classification algorithm? The...
Arindam Banerjee, John Langford
IROS
2008
IEEE
131views Robotics» more  IROS 2008»
14 years 2 months ago
Laser based intersection detection for reactive navigation in an underground mine
— In this paper we propose a new feature detection algorithm to enable junction recognition intended for high speed reactive navigation in tunnel like environments. We also prese...
Johan Larsson, Mathias Broxvall, Alessandro Saffio...
ICALT
2010
IEEE
13 years 6 months ago
Course Ranking and Automated Suggestions through Web Mining
—This paper introduces new metrics for course evaluation. It is also proposes a ranking algorithm that classifies courses based on the previous course evaluation metrics and sugg...
Stavros Valsamidis, Ioannis Kazanidis, Sotirios Ko...
DSS
2007
127views more  DSS 2007»
13 years 7 months ago
Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining
We present two algorithms for learning large-scale gene regulatory networks from microarray data: a modified informationtheory-based Bayesian network algorithm and a modified asso...
Zan Huang, Jiexun Li, Hua Su, George S. Watts, Hsi...
ICSE
2007
IEEE-ACM
14 years 7 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...