Sciweavers

304 search results - page 48 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
KDD
1997
ACM
111views Data Mining» more  KDD 1997»
15 years 3 months ago
SIPping from the Data Firehose
When mining large databases, the data extraction problem and the interface between the database and data mining algorithm become important issues. Rather than giving a mining algo...
George H. John, Brian Lent
NIPS
2008
15 years 1 months ago
Goal-directed decision making in prefrontal cortex: a computational framework
Research in animal learning and behavioral neuroscience has distinguished between two forms of action control: a habit-based form, which relies on stored action values, and a goal...
Matthew Botvinick, James An
VLDB
2007
ACM
225views Database» more  VLDB 2007»
15 years 12 months ago
An Approach to Optimize Data Processing in Business Processes
In order to optimize their revenues and profits, an increasing number of businesses organize their business activities in terms of business processes. Typically, they automate imp...
Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bern...
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
16 years 1 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
AI
2009
Springer
15 years 6 months ago
Grid-Enabled Adaptive Metamodeling and Active Learning for Computer Based Design
Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a feasible alte...
Dirk Gorissen