Sciweavers

732 search results - page 66 / 147
» Mining Postal Addresses
Sort
View
SACMAT
2009
ACM
14 years 16 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
KDD
2007
ACM
139views Data Mining» more  KDD 2007»
14 years 8 months ago
Looking for Great Ideas: Analyzing the Innovation Jam
We discuss the Innovation Jam that IBM carried out in 2006, with the objective of identifying innovative and promising "Big Ideas" through a moderated on-line discussion...
Wojciech Gryc, Mary E. Helander, Richard D. Lawren...
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
14 years 2 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
PKDD
2009
Springer
181views Data Mining» more  PKDD 2009»
14 years 2 months ago
Active Learning for Reward Estimation in Inverse Reinforcement Learning
Abstract. Inverse reinforcement learning addresses the general problem of recovering a reward function from samples of a policy provided by an expert/demonstrator. In this paper, w...
Manuel Lopes, Francisco S. Melo, Luis Montesano
ADMA
2008
Springer
151views Data Mining» more  ADMA 2008»
14 years 2 months ago
Link-Contexts for Ranking
Anchor text has been shown to be effective in ranking[6] and a variety of information retrieval tasks on web pages. Some authors have expanded on anchor text by using the words ar...
Jessica Gronski