Sciweavers

4413 search results - page 668 / 883
» Security for biometric data
Sort
View
MEDINFO
2007
177views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
The Molecular Medicine Informatics Model (MMIM)
In 2005, a major collaboration in Melbourne Australia successfully completed implementing a major medical informatics infrastructure – this is now being used for discovery resear...
Marienne Hibbert, Peter Gibbs, Terence O'brien, Pe...
JOT
2008
142views more  JOT 2008»
15 years 4 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 7 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
16 years 4 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier