Sciweavers

405 search results - page 31 / 81
» Avatar-centric Risk Evaluation
Sort
View
89
Voted
WSC
1998
14 years 11 months ago
Business Process Modelling and Analysis Using Discrete-event Simulation
Globalisation and competitive pressure urge many organisations to radically change business processes. Although this approach can provide significant benefits such as reducing cos...
Vlatka Hlupic, Stewart Robinson
77
Voted
BMCBI
2006
109views more  BMCBI 2006»
14 years 9 months ago
GPNN: Power studies and applications of a neural network method for detecting gene-gene interactions in studies of human disease
Background: The identification and characterization of genes that influence the risk of common, complex multifactorial disease primarily through interactions with other genes and ...
Alison A. Motsinger, Stephen L. Lee, George Mellic...
ECOI
2006
59views more  ECOI 2006»
14 years 9 months ago
Model-building with interpolated temporal data
Ecological data can be difficult to collect, and as a result, some important temporal ecological datasets contain irregularly sampled data. Since many temporal modelling technique...
Robert I. McKay, Tuan Hao Hoang, Naoki Mori, Nguye...
ICDE
2009
IEEE
192views Database» more  ICDE 2009»
15 years 11 months ago
Deriving Private Information from Association Rule Mining Results
Data publishing can provide enormous benefits to the society. However, due to privacy concerns, data cannot be published in their original forms. Two types of data publishing can a...
Zutao Zhu, Guan Wang, Wenliang Du
IDTRUST
2009
ACM
15 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol