Sciweavers

ACSW
2004
13 years 5 months ago
A Market-based Rule Learning System
In this paper, a `market trading' technique is integrated with the techniques of rule discovery and refinement for data mining. A classifier system-inspired model, the market...
Qingqing Zhou, Martin K. Purvis
ACSW
2004
13 years 5 months ago
Secure Key Issuing in ID-based Cryptography
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
ACSW
2004
13 years 5 months ago
Belief-Based Risk Analysis
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang, Daniel Bradley, Svein J. Knap...
ACSW
2004
13 years 5 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic
ACSW
2004
13 years 5 months ago
Cost-Efficient Mining Techniques for Data Streams
A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
ACSW
2004
13 years 5 months ago
Experiences in Building a Tool for Navigating Association Rule Result Sets
Practical knowledge discovery is an iterative process. First, the experiences gained from one mining run are used to inform the parameter setting and the dataset and attribute sel...
Peter Fule, John F. Roddick
ACSW
2004
13 years 5 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz
ACSW
2004
13 years 5 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald
ACSW
2004
13 years 5 months ago
Visualisation and Comparison of Image Collections based on Self-organised Maps
Self-organised maps (SOM) have been widely used for cluster analysis and visualisation purposes in exploratory data mining. In image retrieval applications, SOMs have been used to...
Da Deng, Jianhua Zhang, Martin K. Purvis
ACSW
2004
13 years 5 months ago
Discovering Parallel Text from the World Wide Web
Parallel corpus is a rich linguistic resource for various multilingual text management tasks, including crosslingual text retrieval, multilingual computational linguistics and mul...
Jisong Chen, Rowena Chau, Chung-Hsing Yeh