Efficient role mining for context-aware service recommendation using a high-performance cluster
Service recommendation systems have been trying to utilize context-aware information to
recommend services that better meet the needs of the service consumers. However, current …
recommend services that better meet the needs of the service consumers. However, current …
Online role mining for context-aware mobile service recommendation
Finding and recommending suitable services for mobile devices are increasingly important
due to the popularity of mobile Internet. While recent research has attempted to use role …
due to the popularity of mobile Internet. While recent research has attempted to use role …
Feasibility for automatic data collection
NH Robertson, T Perera - Proceeding of the 2001 Winter …, 2001 - ieeexplore.ieee.org
It is argued that the data collection process is the most crucial and time consuming stage in
the model building process. This is primarily due to the influence that data has in providing …
the model building process. This is primarily due to the influence that data has in providing …
A profile-aware methodological framework for collaborative multidimensional modeling
Multidimensional modeling, ie, the design of cube schemata, has a key role in data
warehouse (DW) projects, in self-service business intelligence, and in general to let users …
warehouse (DW) projects, in self-service business intelligence, and in general to let users …
An FFT-based jitter separation method for high-frequency jitter testing with a 10x reduction in test time
TJ Yamaguchi, M Ishida, HX Hou… - 2007 IEEE …, 2007 - ieeexplore.ieee.org
This paper proposes an FFT-based method that separates random jitter from deterministic
jitter in clock and data patterns, with a 10X reduction in test time. The method has been …
jitter in clock and data patterns, with a 10X reduction in test time. The method has been …
A bandwidth-conscious caching scheme for mobile devices
BN Thyamagondlu, VW Chu… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
While a substantial amount of big data are consumed via mobile devices, accessing content
via wireless data connections on mobile devices has its own set of challenges. Among these …
via wireless data connections on mobile devices has its own set of challenges. Among these …
Over-fitting and error detection for online role mining
Recent research has attempted to use role-based approaches to recommend mobile
services to other members among the same group in a context dependent manner …
services to other members among the same group in a context dependent manner …
How to discover high-quality roles? A survey and dependency analysis of quality criteria in role mining
Roles have evolved into the de facto standard for access control in Enterprise Identity
Management. However, companies struggle to develop and maintain a role-based access …
Management. However, companies struggle to develop and maintain a role-based access …
An approach of role updating in context-aware role mining
With the rapid development of Internet of Things (IoT) and mobile technologies, the service
offerings available in the IoT and mobile environments are increasing dramatically. How to …
offerings available in the IoT and mobile environments are increasing dramatically. How to …
Analyzing quality criteria in role-based identity and access management
Roles have turned into the de facto standard for access control in enterprise identity
management systems. However, as roles evolve over time, companies struggle to develop …
management systems. However, as roles evolve over time, companies struggle to develop …