Sciweavers

1486 search results - page 71 / 298
» Firewall Rules Analysis
Sort
View
AISS
2010
171views more  AISS 2010»
14 years 7 months ago
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining
Computer programming is one of the most essential skills which each graduate has to acquire. However, there are reports that they are unable to write a program well. Researches in...
Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Waha...
JAMIA
2011
140views more  JAMIA 2011»
14 years 2 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
ICML
1999
IEEE
16 years 20 days ago
Lazy Bayesian Rules: A Lazy Semi-Naive Bayesian Learning Technique Competitive to Boosting Decision Trees
Lbr is a lazy semi-naive Bayesian classi er learning technique, designed to alleviate the attribute interdependence problem of naive Bayesian classi cation. To classify a test exa...
Zijian Zheng, Geoffrey I. Webb, Kai Ming Ting
ICDAR
2009
IEEE
15 years 6 months ago
The Understanding and Structure Analyzing for Online Handwritten Chemical Formulas
In this paper, we propose a novel approach for understanding and analyzing the online handwritten chemical formulas. With the structural characteristics, semantic rules, and more ...
Xin Wang, Guangshun Shi, Jufeng Yang
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 12 months ago
Mining The Successful Binary Combinations: Methodology and A Simple Case Study
The importance of finding the characteristics leading to either a success or a failure is one of the driving forces of data mining. The various application areas of finding succes...
Yuval Cohen