-
1
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Agrawal, R., Imieliński, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. Int Conf on Mngm of Data, 22, 207-216.
-
(1993)
Int Conf on Mngm of Data
, vol.22
, pp. 207-216
-
-
Agrawal, R.1
Imieliński, T.2
Swami, A.3
-
4
-
-
57349100404
-
Fast exact and heuristic methods for role minimization problems
-
Ene, A., Horne, W., Milosavljevic, N., Rao, P., Schreiber, R., & Tarjan, R. E. (2008). Fast exact and heuristic methods for role minimization problems. Symp on Access Control Models and Technologies (pp. 1-10).
-
(2008)
Symp on Access Control Models and Technologies
, pp. 1-10
-
-
Ene, A.1
Horne, W.2
Milosavljevic, N.3
Rao, P.4
Schreiber, R.5
Tarjan, R.E.6
-
5
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur, 4, 224-274.
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
44649150208
-
Factorisation and denoising of 0-1 data: A variational approach
-
Kabán, A., & Bingham, E. (2008). Factorisation and denoising of 0-1 data: A variational approach. Neu-rocomputing, 71, 2291-2308.
-
(2008)
Neu-rocomputing
, vol.71
, pp. 2291-2308
-
-
Kabán, A.1
Bingham, E.2
-
9
-
-
33750696648
-
Learning systems of concepts with an infinite relational model
-
Kemp, C., Tenenbaum, J. B., Griffths, T. L., Yamada, T., & Ueda, N. (2006). Learning systems of concepts with an infinite relational model. Nat Conf on Artificial Intelligence (pp. 763-770).
-
(2006)
Nat Conf on Artificial Intelligence
, pp. 763-770
-
-
Kemp, C.1
Tenenbaum, J.B.2
Griffths, T.L.3
Yamada, T.4
Ueda, N.5
-
10
-
-
0242625194
-
Role mining - revealing business roles for security administration using data mining technology
-
Kuhlmann, M., Shohat, D., & Schimpf, G. (2003). Role mining - revealing business roles for security administration using data mining technology. Symp on Access Control Models and Technologies (pp. 179-186).
-
(2003)
Symp on Access Control Models and Technologies
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
11
-
-
2442611856
-
Stability-based validation of clustering solutions
-
Lange, T., Roth, V., Braun, M. L., & Buhmann, J. M. (2004). Stability-based validation of clustering solutions. Neural Computation, 16, 1299-1323.
-
(2004)
Neural Computation
, vol.16
, pp. 1299-1323
-
-
Lange, T.1
Roth, V.2
Braun, M.L.3
Buhmann, J.M.4
-
12
-
-
33750356685
-
The Discrete Basis Problem
-
Miettinen, P., Mielikäinen, T., Gionis, A., Das, G., & Mannila, H. (2006). The Discrete Basis Problem. Proc of Principles and Practice of Knowledge Discovery in Databases (pp. 335-346).
-
(2006)
Proc of Principles and Practice of Knowledge Discovery in Databases
, pp. 335-346
-
-
Miettinen, P.1
Mielikäinen, T.2
Gionis, A.3
Das, G.4
Mannila, H.5
-
15
-
-
56149116656
-
Classification of multi-labeled data: A generative approach
-
Streich, A. P., & Buhmann, J. M. (2008). Classification of multi-labeled data: A generative approach. Europ Conf on Machine Learning (pp. 390-405).
-
(2008)
Europ Conf on Machine Learning
, pp. 390-405
-
-
Streich, A.P.1
Buhmann, J.M.2
-
17
-
-
80053160972
-
A non-parametric bayesian method for inferring hidden causes
-
Wood, F. (2006). A non-parametric bayesian method for inferring hidden causes. Conf on Uncertainty in Artificial Intelligence (pp. 536-543).
-
(2006)
Conf on Uncertainty in Artificial Intelligence
, pp. 536-543
-
-
Wood, F.1
|