Sciweavers

326 search results - page 28 / 66
» Subgroup Discovery Techniques and Applications
Sort
View
SACMAT
2011
ACM
13 years 14 days ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
ALMOB
2006
138views more  ALMOB 2006»
13 years 9 months ago
A combinatorial optimization approach for diverse motif finding applications
Background: Discovering approximately repeated patterns, or motifs, in biological sequences is an important and widely-studied problem in computational molecular biology. Most fre...
Elena Zaslavsky, Mona Singh
IFIPTM
2010
139views Management» more  IFIPTM 2010»
13 years 8 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
SASN
2004
ACM
14 years 3 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
DEXA
2008
Springer
137views Database» more  DEXA 2008»
13 years 11 months ago
A Grid-Based Multi-relational Approach to Process Mining
Abstract. Industrial, scientific, and commercial applications use information systems to trace the execution of a business process. Relevant events are registered in massive logs a...
Antonio Turi, Annalisa Appice, Michelangelo Ceci, ...