Sciweavers

3651 search results - page 93 / 731
» Data Mining for Security Applications
Sort
View
105
Voted
IJKDB
2010
141views more  IJKDB 2010»
14 years 10 months ago
Mining Frequent Boolean Expressions: Application to Gene Expression and Regulatory Modeling
Regulatory network analysis and other bioinformatics tasks require the ability to induce and represent arbitrary boolean expressions from data sources. We introduce a novel framew...
Mohammed Javeed Zaki, Naren Ramakrishnan, Lizhuang...
ESWA
2007
176views more  ESWA 2007»
15 years 17 days ago
Credit scoring with a data mining approach based on support vector machines
The credit card industry has been growing rapidly recently, and thus huge numbers of consumers’ credit data are collected by the credit department of the bank. The credit scorin...
Cheng-Lung Huang, Mu-Chen Chen, Chieh-Jen Wang
IJMI
2007
140views more  IJMI 2007»
15 years 16 days ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
120
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
126
Voted
ACL
2011
14 years 4 months ago
An Algorithm for Unsupervised Transliteration Mining with an Application to Word Alignment
We propose a language-independent method for the automatic extraction of transliteration pairs from parallel corpora. In contrast to previous work, our method uses no form of supe...
Hassan Sajjad, Alexander Fraser, Helmut Schmid