Sciweavers

3055 search results - page 343 / 611
» Conceptual Modeling for Data Integration
Sort
View
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
15 years 3 months ago
Subgroup Discovery Meets Bayesian Networks -- An Exceptional Model Mining Approach
Whenever a dataset has multiple discrete target variables, we want our algorithms to consider not only the variables themselves, but also the interdependencies between them. We pro...
Wouter Duivesteijn, Arno J. Knobbe, Ad Feelders, M...
FGCS
2011
123views more  FGCS 2011»
15 years 1 days ago
Mapping attribution metadata to the Open Provenance Model
A description of a data item’s provenance can be provided in different forms, and which form is best depends on the intended use of that description. Because of this, differen...
Simon Miles
MHCI
2009
Springer
15 years 11 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
WSC
2007
15 years 7 months ago
Generic simulation of automotive assembly for interoperability testing
Computer simulation is effective in improving the efficiency of manufacturing system design, operation, and maintenance. Most simulation models are usually tailored to address a n...
Deogratias Kibira, Charles R. McLean
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 10 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...