Sciweavers

62 search results - page 4 / 13
» Role mining - revealing business roles for security administ...
Sort
View
AIME
2009
Springer
14 years 18 days ago
Mining Healthcare Data with Temporal Association Rules: Improvements and Assessment for a Practical Use
Abstract. The Regional Healthcare Agency (ASL) of Pavia has been maintaining a central data repository which stores healthcare data about the population of Pavia area. The analysis...
Stefano Concaro, Lucia Sacchi, Carlo Cerra, Pietro...
PAKM
2000
13 years 7 months ago
Facilitating the Online Search of Experts at NASA using Expert Seeker People-Finder
People-Finder Systems are knowledge repositories that attempt to manage knowledge by holding pointers to experts who possess specific knowledge within an organization. This paper ...
Irma Becerra-Fernandez
CSREASAM
2006
13 years 7 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
EWMF
2005
Springer
13 years 11 months ago
Introducing Semantics in Web Personalization: The Role of Ontologies
Web personalization is the process of customizing a web site to the needs of each specific user or set of users. Personalization of a web site may be performed by the provision of ...
Magdalini Eirinaki, Dimitrios Mavroeidis, George T...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 6 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei