Sciweavers

2748 search results - page 331 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
KDD
2003
ACM
109views Data Mining» more  KDD 2003»
16 years 5 months ago
Experimental design for solicitation campaigns
Data mining techniques are routinely used by fundraisers to select those prospects from a large pool of candidates who are most likely to make a financial contribution. These tech...
Uwe F. Mayer, Armand Sarkissian
WSC
2008
15 years 6 months ago
Guidelines for commercial off-the-shelf Simulation Package interoperability
Commercial-off-the-shelf (COTS) Simulation Packages (CSPs) are widely used visual interactive modeling environments such as ArenaTM, AnylogicTM, FlexsimTM, Simul8TM, WitnessTM, et...
Simon J. E. Taylor, Stephen John Turner, Steffen S...
114
Voted
ER
2004
Springer
79views Database» more  ER 2004»
15 years 10 months ago
Multi-phase Process Mining: Building Instance Graphs
Abstract. Deploying process-driven information systems is a time-consuming and error-prone task. Process mining attempts to improve this by automatically generating a process model...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
BMCBI
2005
103views more  BMCBI 2005»
15 years 4 months ago
Many accurate small-discriminatory feature subsets exist in microarray transcript data: biomarker discovery
Background: Molecular profiling generates abundance measurements for thousands of gene transcripts in biological samples such as normal and tumor tissues (data points). Given such...
Leslie Grate
ICCCN
2008
IEEE
15 years 11 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli