Sciweavers

62 search results - page 11 / 13
» Role mining - revealing business roles for security administ...
Sort
View
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
14 years 7 months ago
Scrutinizing Frequent Pattern Discovery Performance
Benchmarking technical solutions is as important as the solutions themselves. Yet many fields still lack any type of rigorous evaluation. Performance benchmarking has always been ...
Mohammad El-Hajj, Osmar R. Zaïane, Stella Luk...
DAWAK
2009
Springer
13 years 4 months ago
BitCube: A Bottom-Up Cubing Engineering
Enhancing on line analytical processing through efficient cube computation plays a key role in Data Warehouse management. Hashing, grouping and mining techniques are commonly used ...
Alfredo Ferro, Rosalba Giugno, Piera Laura Puglisi...
WWW
2010
ACM
13 years 6 months ago
LINKREC: a unified framework for link recommendation with user attributes and graph structure
With the phenomenal success of networking sites (e.g., Facebook, Twitter and LinkedIn), social networks have drawn substantial attention. On online social networking sites, link r...
Zhijun Yin, Manish Gupta, Tim Weninger, Jiawei Han
JPDC
2008
217views more  JPDC 2008»
13 years 6 months ago
Parallel techniques for information extraction from hyperspectral imagery using heterogeneous networks of workstations
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. In particular, NASA is continuously gath...
Antonio J. Plaza
AAAI
2007
13 years 8 months ago
Using AI for e-Government Automatic Assessment of Immigration Application Forms
This paper describes an e-Government AI project that provides a range of intelligent AI services to support automated assessment of various types of applications submitted to an i...
Andy Hon Wai Chun