Sciweavers

178 search results - page 36 / 36
» Mutual Information Analysis: a Comprehensive Study
Sort
View
SAC
2005
ACM
13 years 11 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
BMCBI
2010
162views more  BMCBI 2010»
13 years 5 months ago
SNP-RFLPing 2: an updated and integrated PCR-RFLP tool for SNP genotyping
Background: PCR-restriction fragment length polymorphism (RFLP) assay is a cost-effective method for SNP genotyping and mutation detection, but the manual mining for restriction e...
Hsueh-Wei Chang, Yu-Huei Cheng, Li-Yeh Chuang, Che...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
13 years 11 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...