Sciweavers

25111 search results - page 4842 / 5023
» Information Systems
Sort
View
CCS
2006
ACM
15 years 9 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
KDD
2000
ACM
101views Data Mining» more  KDD 2000»
15 years 9 months ago
Incremental quantile estimation for massive tracking
Data--call records, internet packet headers, or other transaction records--are coming down a pipe at a ferocious rate, and we need to monitor statistics of the data. There is no r...
Fei Chen, Diane Lambert, José C. Pinheiro
167
Voted
KDD
2000
ACM
162views Data Mining» more  KDD 2000»
15 years 9 months ago
Data Mining from Functional Brain Images
Recent advances in functional brain imaging enable identication of active areas of a brain performing a certain function. Induction of logical formulas describing relations betwee...
Mitsuru Kakimoto, Chie Morita, Yoshiaki Kikuchi, H...
GECCO
2010
Springer
192views Optimization» more  GECCO 2010»
15 years 8 months ago
Resource abundance promotes the evolution of public goods cooperation
Understanding the evolution of cooperation as part of an evolutionary stable strategy (ESS) is a difficult problem that has been the focus of much work. The associated costs of co...
Brian D. Connelly, Benjamin E. Beckmann, Philip K....
HT
2010
ACM
15 years 7 months ago
Analysis of graphs for digital preservation suitability
We investigate the use of autonomically created small-world graphs as a framework for the long term storage of digital objects on the Web in a potentially hostile environment. We ...
Charles L. Cartledge, Michael L. Nelson
« Prev « First page 4842 / 5023 Last » Next »