Sciweavers

2520 search results - page 188 / 504
» Knowledge Management Challenges in Knowledge Discovery Syste...
Sort
View
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 11 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
GEOINFO
2007
15 years 5 months ago
Ecologically-aware Queries for Biodiversity Research
To carry ecologically-relevant biodiversity research, one must collect chunks of information on species and their habitats from a large number of institutions and correlate them us...
Luiz Celso Gomes Jr., Claudia Bauzer Medeiros
SIGKDD
2002
162views more  SIGKDD 2002»
15 years 4 months ago
Background and Overview for KDD Cup 2002 Task 1: Information Extraction from Biomedical Articles
This paper presents a background and overview for task 1 (of 2 tasks) of the KDD Challenge Cup 2002, a competition held in conjunction with the ACM SIGKDD International Conference...
Alexander S. Yeh, Lynette Hirschman, Alexander A. ...
IJAR
2006
133views more  IJAR 2006»
15 years 4 months ago
Extraction of similarity based fuzzy rules from artificial neural networks
A method to extract a fuzzy rule based system from a trained artificial neural network for classification is presented. The fuzzy system obtained is equivalent to the correspondin...
Carlos Javier Mantas, José Manuel Puche, J....
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...