Sciweavers

1217 search results - page 167 / 244
» On compressing frequent patterns
Sort
View
CIDM
2009
IEEE
15 years 10 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
DATE
2009
IEEE
115views Hardware» more  DATE 2009»
15 years 10 months ago
Response-time analysis of arbitrarily activated tasks in multiprocessor systems with shared resources
—As multiprocessor systems are increasingly used in real-time environments, scheduling and synchronization analysis of these platforms receive growing attention. However, most kn...
Mircea Negrean, Simon Schliecker, Rolf Ernst
DDECS
2009
IEEE
128views Hardware» more  DDECS 2009»
15 years 10 months ago
A fast untestability proof for SAT-based ATPG
—Automatic Test Pattern Generation (ATPG) based on Boolean satisfiability (SAT) has been shown to be a beneficial complement to traditional ATPG techniques. Boolean solvers wor...
Daniel Tille, Rolf Drechsler
BMEI
2008
IEEE
15 years 10 months ago
Discovering Multi-dimensional Major Medicines from Traditional Chinese Medicine Prescriptions
Multi-dimensional major medicines analysis is one of the most important tasks in the data analysis of Traditional Chinese Medicine (TCM) prescriptions. In this paper, an effective...
Chuan Li, Changjie Tang, Chunqiu Zeng, Jiang Wu, Y...
IV
2008
IEEE
100views Visualization» more  IV 2008»
15 years 10 months ago
An Interactive Map of Semantic Web Ontology Usage
Publishing information on the Semantic Web using common formats enables data to be linked together, integrated and reused. In order to fully leverage the potential for interlinkin...
Sheila Kinsella, Uldis Bojars, Andreas Harth, John...