Sciweavers

ACSW
2004
13 years 10 months ago
Clustering Stream Data by Regression Analysis
In data clustering, many approaches have been proposed such as K-means method and hierarchical method. One of the problems is that the results depend heavily on initial values and...
Masahiro Motoyoshi, Takao Miura, Isamu Shioya
ACSW
2004
13 years 10 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...
ACSW
2004
13 years 10 months ago
A Market-based Rule Learning System
In this paper, a `market trading' technique is integrated with the techniques of rule discovery and refinement for data mining. A classifier system-inspired model, the market...
Qingqing Zhou, Martin K. Purvis
ACSW
2004
13 years 10 months ago
Secure Key Issuing in ID-based Cryptography
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
ACSW
2004
13 years 10 months ago
Belief-Based Risk Analysis
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang, Daniel Bradley, Svein J. Knap...
ACSW
2004
13 years 10 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic
ACSW
2004
13 years 10 months ago
Cost-Efficient Mining Techniques for Data Streams
A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
ACSW
2004
13 years 10 months ago
Experiences in Building a Tool for Navigating Association Rule Result Sets
Practical knowledge discovery is an iterative process. First, the experiences gained from one mining run are used to inform the parameter setting and the dataset and attribute sel...
Peter Fule, John F. Roddick
ACSW
2004
13 years 10 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz
ACSW
2004
13 years 10 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald