Sciweavers

2148 search results - page 128 / 430
» Multidimensional Data Modeling for Business Process Analysis
Sort
View
ICDM
2009
IEEE
108views Data Mining» more  ICDM 2009»
15 years 10 months ago
RING: An Integrated Method for Frequent Representative Subgraph Mining
—We propose a novel representative based subgraph mining model. A series of standards and methods are proposed to select invariants. Patterns are mapped into invariant vectors in...
Shijie Zhang, Jiong Yang, Shirong Li
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 6 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
DAC
2009
ACM
16 years 4 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
16 years 3 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
SIGECOM
2003
ACM
174views ECommerce» more  SIGECOM 2003»
15 years 8 months ago
Collaboration software to reduce inventory and increase response
Some recent trends in business and manufacturing hold the promise of greater profits, yet, due to profit-robbing inventory increases, this promise has not been fully realized. [9]...
Indu Bingham, Barbara Hoefle, Kim Phan, Jim Sizemo...