Sciweavers

471 search results - page 53 / 95
» Social applications: exploring a more secure framework
Sort
View
IS
2007
13 years 7 months ago
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....
DS
1997
104views Database» more  DS 1997»
13 years 9 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 8 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
SP
1989
IEEE
13 years 12 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
BMCBI
2007
134views more  BMCBI 2007»
13 years 8 months ago
A framework for significance analysis of gene expression data using dimension reduction methods
Background: The most popular methods for significance analysis on microarray data are well suited to find genes differentially expressed across predefined categories. However, ide...
Lars Halvor Gidskehaug, Endre Anderssen, Arnar Fla...