Efficient role mining for context-aware service recommendation using a high-performance cluster

Z Yu, RK Wong, CH Chi - IEEE transactions on services …, 2015 - ieeexplore.ieee.org
Service recommendation systems have been trying to utilize context-aware information to
recommend services that better meet the needs of the service consumers. However, current …

Online role mining for context-aware mobile service recommendation

RK Wong, VW Chu, T Hao - Personal and Ubiquitous Computing, 2014 - Springer
Finding and recommending suitable services for mobile devices are increasingly important
due to the popularity of mobile Internet. While recent research has attempted to use role …

Feasibility for automatic data collection

NH Robertson, T Perera - Proceeding of the 2001 Winter …, 2001 - ieeexplore.ieee.org
It is argued that the data collection process is the most crucial and time consuming stage in
the model building process. This is primarily due to the influence that data has in providing …

A profile-aware methodological framework for collaborative multidimensional modeling

A Sakka, S Bimonte, S Rizzi, L Sautot, F Pinet… - Data & Knowledge …, 2021 - Elsevier
Multidimensional modeling, ie, the design of cube schemata, has a key role in data
warehouse (DW) projects, in self-service business intelligence, and in general to let users …

An FFT-based jitter separation method for high-frequency jitter testing with a 10x reduction in test time

TJ Yamaguchi, M Ishida, HX Hou… - 2007 IEEE …, 2007 - ieeexplore.ieee.org
This paper proposes an FFT-based method that separates random jitter from deterministic
jitter in clock and data patterns, with a 10X reduction in test time. The method has been …

A bandwidth-conscious caching scheme for mobile devices

BN Thyamagondlu, VW Chu… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
While a substantial amount of big data are consumed via mobile devices, accessing content
via wireless data connections on mobile devices has its own set of challenges. Among these …

Over-fitting and error detection for online role mining

VW Chu, RK Wong, CH Chi - International Journal of Web Services …, 2012 - igi-global.com
Recent research has attempted to use role-based approaches to recommend mobile
services to other members among the same group in a context dependent manner …

How to discover high-quality roles? A survey and dependency analysis of quality criteria in role mining

M Kunz, L Fuchs, M Netter, G Pernul - … 2015, Angers, France, February 9-11 …, 2015 - Springer
Roles have evolved into the de facto standard for access control in Enterprise Identity
Management. However, companies struggle to develop and maintain a role-based access …

An approach of role updating in context-aware role mining

J Wang, Z Zhu, J Liu, C Wang, Y Xu - Securing the Internet of Things …, 2020 - igi-global.com
With the rapid development of Internet of Things (IoT) and mobile technologies, the service
offerings available in the IoT and mobile environments are increasing dramatically. How to …

Analyzing quality criteria in role-based identity and access management

M Kunz, L Fuchs, M Netter… - … Conference on Information …, 2015 - ieeexplore.ieee.org
Roles have turned into the de facto standard for access control in enterprise identity
management systems. However, as roles evolve over time, companies struggle to develop …