Sciweavers

3374 search results - page 150 / 675
» Explaining Similarity of Terms
Sort
View
SACMAT
2010
ACM
15 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
ICPR
2004
IEEE
16 years 5 months ago
Feature Selection and Gene Clustering from Gene Expression Data
In this article we describe an algorithm for feature selection and gene clustering from high dimensional gene expression data. The method is based on measuring similarity between ...
D. Dutta Majumder, Pabitra Mitra
MIR
2010
ACM
224views Multimedia» more  MIR 2010»
15 years 11 months ago
Digimatge, a rich internet application for video retrieval from a multimedia asset management system
This paper describes the integration of two new services aimed at assisting into the retrieval of video content from a Multimedia Asset Manager (MAM). The first tool suggest tags...
Xavier Giro i Nieto, Ramon Salla, Xavier Vives
PAKDD
2009
ACM
127views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Clustering Documents Using a Wikipedia-Based Concept Representation
Abstract. This paper shows how Wikipedia and the semantic knowledge it contains can be exploited for document clustering. We first create a concept-based document representation b...
Anna Huang, David N. Milne, Eibe Frank, Ian H. Wit...
POLICY
2009
Springer
15 years 10 months ago
Strong and Weak Policy Relations
—Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language ...
Michael J. May, Carl A. Gunter, Insup Lee, Steve Z...