Sciweavers

8614 search results - page 1715 / 1723
» Mining
Sort
View
CSMR
2010
IEEE
13 years 2 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
KAIS
2011
129views more  KAIS 2011»
13 years 2 months ago
Counting triangles in real-world networks using projections
Triangle counting is an important problem in graph mining. Two frequently used metrics in complex network analysis which require the count of triangles are the clustering coefficie...
Charalampos E. Tsourakakis
NAR
2011
307views Computer Vision» more  NAR 2011»
13 years 2 months ago
BRENDA, the enzyme information system in 2011
The BRENDA (BRaunschweig ENzyme Database, http://www.brenda-enzymes.org) enzyme information system is the main collection of enzyme functional and property data for the scientific...
Maurice Scheer, Andreas Grote, Antje Chang, Ida Sc...
TFS
2011
242views Education» more  TFS 2011»
13 years 2 months ago
Linguistic Summarization Using IF-THEN Rules and Interval Type-2 Fuzzy Sets
—Linguistic summarization (LS) is a data mining or knowledge discovery approach to extract patterns from databases. Many authors have used this technique to generate summaries li...
Dongrui Wu, Jerry M. Mendel
TSMC
2011
228views more  TSMC 2011»
13 years 2 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
« Prev « First page 1715 / 1723 Last » Next »