Sciweavers

439 search results - page 54 / 88
» Filtered-top-k association discovery
Sort
View
IWPC
2006
IEEE
15 years 5 months ago
Dynamic Analysis of Software Systems using Execution Pattern Mining
Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
Hossein Safyallah, Kamran Sartipi
NCA
2006
IEEE
15 years 5 months ago
Multi-Path Multi-Channel Routing Protocol
In this paper we present a DSR-based multi-path Routing protocol, which has been developed for transmission of Multiple Description Coded (MDC) packets in wireless ad-hoc network ...
Bo Yan, Hamid Gharavi
SKG
2005
IEEE
15 years 5 months ago
Information Services for Dynamically Assembled Semantic Grids
The information management requirements in systems based on Web Service Architecture principles include both the management of large amounts of relatively static services and assoc...
Mehmet S. Aktas, Geoffrey Fox, Marlon E. Pierce
ISI
2005
Springer
15 years 5 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
15 years 5 months ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...