Sciweavers

62 search results - page 3 / 13
» Role mining - revealing business roles for security administ...
Sort
View
BMCBI
2005
153views more  BMCBI 2005»
13 years 5 months ago
Mining published lists of cancer related microarray experiments: Identification of a gene expression signature having a critical
Background: Routine application of gene expression microarray technology is rapidly producing large amounts of data that necessitate new approaches of analysis. The analysis of a ...
Giacomo Finocchiaro, Francesco Mancuso, Heiko M&uu...
KES
2008
Springer
13 years 3 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 6 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
KDD
2009
ACM
172views Data Mining» more  KDD 2009»
14 years 1 days ago
The role of game theory in human computation systems
The paradigm of “human computation” seeks to harness human abilities to solve computational problems or otherwise perform distributed work that is beyond the scope of current ...
Shaili Jain, David C. Parkes
ATAL
2008
Springer
13 years 7 months ago
Agent-community-network-based business matching and collaboration support system
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ke...