We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,290 results
  1. Anomaly detection of policies in distributed firewalls using data log analysis

    A distributed firewall is a security application that monitors and controls traffic on an organization’s network. While centralized firewalls are...

    Azam Andalib, Seyed Morteza Babamir in The Journal of Supercomputing
    Article 29 May 2023
  2. Policies and metrics for schedulers in cloud data-centers using CloudSim simulator

    Today’s cloud technology consumers must address escalating computing and storage demands for services and applications. However, decision-making on...

    Lakshmi Sankaran, J. S. Saleema, Basem Suleiman in International Journal of Data Science and Analytics
    Article 15 December 2023
  3. Offline Mining of Microservice-Based Architectures (Extended Version)

    Designing applications adhering to the key design principles of microservice-based architectures (MSAs) enables fully exploiting the potentials of...

    Jacopo Soldani, Javad Khalili, Antonio Brogi in SN Computer Science
    Article Open access 01 April 2023
  4. Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm

    Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is...

    Duy Thanh Tran, Jun-Ho Huh in The Journal of Supercomputing
    Article 18 March 2023
  5. Data Mining Based Method for Integrating Online English SPOC Curriculum Resources

    In order to improve the integration effect of English SPOC course resources and improve students’ English grades, this article proposes an online...
    Conference paper 2024
  6. Ethics in the mining of software repositories

    Research in Mining Software Repositories (MSR) is research involving human subjects, as the repositories usually contain data about developers’ and...

    Nicolas E. Gold, Jens Krinke in Empirical Software Engineering
    Article Open access 02 November 2021
  7. Efficient Pruning Strategy for Mining High Utility Quantitative Itemsets

    High Utility Quantitative Itemset Mining (HUQIM), which is an extension of the original High Utility Itemset Mining (HUIM), has become an important...
    Loan T. T. Nguyen, Anh N. H. Pham, ... N. T. Tung in Advances in Computational Collective Intelligence
    Conference paper 2023
  8. Conclusion stability for natural language based mining of design discussions

    Developer discussions range from in-person hallway chats to comment chains on bug reports. Being able to identify discussions that touch on software...

    Alvi Mahadi, Neil A. Ernst, Karan Tongay in Empirical Software Engineering
    Article 23 October 2021
  9. Identifying high-risk over-entitlement in access control policies using fuzzy logic

    Analysing access control policies is an essential process for ensuring over-prescribed permissions are identified and removed. This is a...

    Simon Parkinson, Saad Khana in Cybersecurity
    Article Open access 02 March 2022
  10. SPAC: Scalable Pattern Approximate Counting in Graph Mining

    Pattern counting is a crucial task in graph pattern mining. Accurate counting is not affordable as the datasets grow larger and larger, and...
    Ruini Xue, Yijun Wang, ... Weimin Zheng in Algorithms and Architectures for Parallel Processing
    Conference paper 2023
  11. Enterprise Strategic Financing Risk Management Auxiliary Education System Based on Data Mining

    In order to ensure the use effect of enterprise strategic financing risk management auxiliary education system, an enterprise strategic financing...
    Conference paper 2022
  12. An Association Rule Mining-Based Framework for the Discovery of Anomalous Behavioral Patterns

    The identification of different risks and threats has become a top priority for organizations in recent years. Various techniques in both data and...
    Azadeh Sadat Mozafari Mehr, Renata M. de Carvalho, Boudewijn van Dongen in Advanced Data Mining and Applications
    Conference paper 2022
  13. Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control Policies

    Although being well-adopted and in widespread use, attribute-based access control (ABAC) remains a hard-to-master security paradigm in application...
    Marius Schlegel, Peter Amthor in E-Business and Telecommunications
    Conference paper 2023
  14. Analysis of the Online Home Consumption Database Based on Data Mining

    In current times where there are smart devices for households, and that apart from having different functions that are helpful in daily household...
    Conference paper 2022
  15. Resource Allocation Optimization in Business Processes Supported by Reinforcement Learning and Process Mining

    Resource allocation to execute business processes is increasingly crucial for organizations. As the cost of executing process tasks relies on several...
    Thais Rodrigues Neubauer, Valdinei Freire da Silva, ... Sarajane Marques Peres in Intelligent Systems
    Conference paper 2022
  16. A survey on the use of data and opinion mining in social media to political electoral outcomes prediction

    Election polls are the de facto mechanisms to predict political outcomes. Traditionally, they are conducted with personal interviews and...

    Jéssica S. Santos, Flavia Bernardini, Aline Paes in Social Network Analysis and Mining
    Article 20 October 2021
  17. Behind the scenes of educational data mining

    Research based on educational data mining conducted at academic institutions is often limited by the institutional policy with regard to the type of...

    Yael Feldman-Maggor, Sagiv Barhoom, ... Inbal Tuvi-Arad in Education and Information Technologies
    Article 01 September 2020
  18. Synthesising Reinforcement Learning Policies Through Set-Valued Inductive Rule Learning

    Today’s advanced Reinforcement Learning algorithms produce black-box policies, that are often difficult to interpret and trust for a person. We...
    Youri Coppens, Denis Steckelmacher, ... Ann Nowé in Trustworthy AI - Integrating Learning, Optimization and Reasoning
    Conference paper 2021
  19. The Ethics of Sharing: Privacy, Data, and Common Goods

    Given the concerns about big tech’s hoarding of data, creation of profiles, mining of data, and extrapolation of new knowledge from their data...

    Sille Obelitz Søe, Jens-Erik Mai in Digital Society
    Article Open access 17 July 2023
  20. Credit Risk Models in the Mexican Context Using Machine Learning

    The Default Rate is related to the period of the economic cycle in which they are observed, during expansion periods of the economy the default rate...
    Ana Lilia López, Estefanía López, Hiram Ponce in Advances in Computational Intelligence
    Conference paper 2022
Did you find what you were looking for? Share feedback.