Sciweavers

1486 search results - page 276 / 298
» Firewall Rules Analysis
Sort
View
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
14 years 9 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 9 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
EDM
2009
116views Data Mining» more  EDM 2009»
14 years 9 months ago
Determining the Significance of Item Order In Randomized Problem Sets
Researchers who make tutoring systems would like to know which sequences of educational content lead to the most effective learning by their students. The majority of data collecte...
Zachary A. Pardos, Neil T. Heffernan
BMCBI
2010
140views more  BMCBI 2010»
14 years 9 months ago
An improved machine learning protocol for the identification of correct Sequest search results
Background: Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectr...
Morten Kallberg, Hui Lu
SADM
2010
141views more  SADM 2010»
14 years 6 months ago
A parametric mixture model for clustering multivariate binary data
: The traditional latent class analysis (LCA) uses a mixture model with binary responses on each subject that are independent conditional on cluster membership. However, in many pr...
Ajit C. Tamhane, Dingxi Qiu, Bruce E. Ankenman