Sciweavers

3604 search results - page 720 / 721
» Relation rule mining
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
GEOS
2009
Springer
13 years 5 months ago
Narrative Geospatial Knowledge in Ethnographies: Representation and Reasoning
Abstract. Narrative descriptions about populated places are very common in ethnographies. In old articles and books on the migration history of Taiwan aborigines, for example, narr...
Chin-Lung Chang, Yi-Hong Chang, Tyng-Ruey Chuang, ...
BMCBI
2010
140views more  BMCBI 2010»
13 years 5 months ago
An improved machine learning protocol for the identification of correct Sequest search results
Background: Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectr...
Morten Kallberg, Hui Lu
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 2 months ago
Data Cleaning and Query Answering with Matching Dependencies and Matching Functions
Matching dependencies were recently introduced as declarative rules for data cleaning and entity resolution. Enforcing a matching dependency on a database instance identifies the ...
Leopoldo E. Bertossi, Solmaz Kolahi, Laks V. S. La...
ISEMANTICS
2010
13 years 2 months ago
Towards the formalization of interaction semantics
With the advent of Web 2.0 and the emergence of improved technologies to enhance UI, the importance of user experience and intuitiveness of Web interfaces led to the growth and su...
Irene Celino, Francesco Corcoglioniti