12 Hits in 3.0 sec

Parallel mining of association rules using a lattice based approach

Wessel Thomas
2007 Proceedings 2007 IEEE SoutheastCon  
However the costs associated with these algorithms are hash tree construction, hash tree traversal, communication overhead, input/output (I/O) cost and data movement respectively.  ...  We implemented a parallel algorithm that used a lattice approach for mining association rules.  ...  Acknowledgements I thank my advisor, Professor Junping Sun for his extraordinary patience while modifying and editing the earlier drafts of this dissertation.  ... 
doi:10.1109/secon.2007.342981 fatcat:z3xe4f6hs5cybcl4ttd5p5au2e

System Runs Analysis with Process Mining

S. A. Shershakov, V. A. Rubin
2016 Modelirovanie i Analiz Informacionnyh Sistem  
We applied mature process mining techniques for discovery and analysis of these logs.  ...  Information systems (IS) produce numerous traces and logs at runtime.  ...  A part of a relation diagram for the log database is depicted on Fig. 2 . Here, we distinguish two main parts of physical storage.  ... 
doi:10.18255/1818-1015-2015-6-818-833 fatcat:dyl4uvfoond7xn5psb3s57m4j4

Restricted natural language based querying of clinical databases

Leila Safari, Jon D. Patrick
2014 Journal of Biomedical Informatics  
Results: It is easy to compose a RNLQ via CliniDAL's interface in which query terms are automatically mapped to the underlying data models of a Clinical Information System (CIS) with an accuracy of more  ...  Conclusion: The proposed solution of CliniDAL using the generic mapping and translation algorithms which is enhanced by a temporal analyzer component provides a simple mechanism for composing RNLQ for  ...  Stephen Crawshaw for the proof reading of this paper and also to Yuzhong Cheng for the initial work on CliniDAL.  ... 
doi:10.1016/j.jbi.2014.07.012 pmid:25051402 fatcat:tfjulgkmjbbfdkcq4f6y3baazm

Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey

Michael P. Heinl, Simon Gölz, Christoph Bösch
2022 ACM Computing Surveys  
Remote electronic voting, often called online or Internet voting, has been subject to research for the last four decades.  ...  This paper employs general election principles to derive cryptographic, technical, and organizational requirements for remote electronic voting.  ...  On the one hand, this is because of the many diferent systems employed; on the other hand, this is also because there was and still is no consistent standard for the evaluation of such systems.  ... 
doi:10.1145/3551386 fatcat:6fas4iikyncvlilzoqceb3dcde

An Architecture for the UniFrame Resource Discovery Service [chapter]

Nanditha N. Siram, Rajeev R. Raje, Andrew M. Olson, Barrett R. Bryant, Carol C. Burt, Mikhail Auguston
2002 Lecture Notes in Computer Science  
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for  ...  The URDS architecture on the other hand is designed for 'open' systems by providing for the discovery and interoperation of distributed heterogeneous software components.  ... 
doi:10.1007/3-540-38093-0_2 fatcat:ycipcnou2vaado7biz25sxysem

Journal of Computer Science IJCSIS March 2021 Full Volume

2021 Zenodo  
PaperID 01032112: Training an Intelligent Tutoring System Using Reinforcement Learning (pp. 10-18) Jezuina Koroveshi, University of Tirana, Faculty of Natural Sciences, Albania.  ...  PaperID 01032115: Clustering Massive Packets using a Lock-Free Algorithm of Tree-Based Reduction on GPGPU (pp. 19-24) Ruo Ando, National Institute of Informatics, Center for Cybersecurity Research and  ...  These results consists current, historic, and future data. A new clause FOR SYSTEM TIME in the SELECT ...  ... 
doi:10.5281/zenodo.5571271 fatcat:iao6mhiihfhjlp4b5mcqo3ybta

A Context- and Template-Based Data Compression Approach to Improve Resource-Constrained IoT Systems Interoperability

Jorge Berzosa, Roberto Cortiñas, Luis Gardeazabal
2019 Zenodo  
This heterogeneity leads to an integration challenge regarding interoperability at the connectivity level, including data representation.  ...  In this thesis, we present a novel data compression approach for text-based data formats, namely Context- and Template-based Compression (CTC), which is specially designed taking into account the limitations  ...  Summary and Conclusions The IoT relies on the deployment of interconnected heterogeneous devices and systems.  ... 
doi:10.5281/zenodo.3403230 fatcat:erpyss7zbja6phhuotap7hffsa


T Aleksic, Bitrakov, Skopje, Rijeka Dragojlovic, Ljubljana Hodzar, Horvat, Sarajevo Mandzic, Mlhalic, Turk, S Saksida
For -favorable problems the system is capable of 60 Mflops/s. HEP (Heterogeneous Element processors FPS 164, FPS-164/MAX and FPS-264. Each FPS-» is a single instruction stream computer.  ...  The goal of RP3 project is a parallel system with 512 32-blt microprocessors and 2 Gbytes of main storage.  ...  . • Cl)e system is remarkably robust namely, Individual transputers can be removed from tl)e system while the program is running, and trie system will continue to function afthought with reduced performance  ... 


Ľudmila Hrdináková, Katarína Buzová
2019 Zenodo  
Therefore, it is time to provide a simple general definition of RDM, so we can say that it is a comprehensive set of activities for the organization, storage, access, and preservation of data (Semeler  ...  Otvorenosť je hlavný atribút pri šírení a hodnotení vedeckých produktov v altmetrii.  ... 
doi:10.5281/zenodo.3661408 fatcat:3s2lhbjdnrhu3m4xrtk4pjkfl4

Access control for M2M infrastructures in 5G networks

Andreea Ancuta Corici, Technische Universität Berlin, Technische Universität Berlin, Thomas Magedanz
The management plane resides in multiple components that handle policies for access control or detect malfunctions.  ...  Following the Next Generation Mobile Networks (NGMN) list of 5G system requirements, the 3rd Generation Partnership Project (3GPP) is in the process of standardizing the 5G system core network architecture  ...  ABAC Atribute Based Access Control. ABP Activation By Personalisation. AC Access Control. ACE Authorization Framework for M2M. ACL Access Control List. ACS Access Control Server.  ... 
doi:10.14279/depositonce-9776 fatcat:6gecgrobbndnjapddhoi3omkdm

Accelerated crypto currencies: A systematic analysis of Silvio Gesell's theories and its implementation on local crypto currencies

Fabian Janisch, Lawrence Stapleton
The data was gathered by a web browser based self-administered survey.The results showed that the level of acceptance for the local Freigeld crypto currency exceeds the level of every presented crypto  ...  A biased sample leads to results, who on average, consistently differf rom thet argetp opulation.  ...  The same applies for ap ossible dissatisfaction witht he current monetary/economic system or ag eneral rejection of thel ocal Freigeld crypto currency idea.  ... 
doi:10.34726/hss.2021.81438 fatcat:sohsqaejuzah5j4wqibbztlxju

Migration des Datenmanagements einer datenintensiven Anwendung in ein Big-Data Framework [article]

Dominik Bäßler, Universität Stuttgart, Universität Stuttgart
Die resultierende Hinterfragung der Tauglichkeit von bestimmten Datenmanagements und deren Umsetzung in einem horizontal skalierten System spiegelt sich in der Vorgehensweise als Reflexion wider.  ...  These problems are identified and discussed, resulting in indicators for the preliminary decision making about the benefit of the migration.  ...  /range parti- tioned RDDs) : Outputs to a storage system, e.g., HDFS Tabelle 2 -Verfügbare Operationen auf RDDs (nach [35]) Darstellung von RDDs über die folgenden drei Speicheroptionen  ... 
doi:10.18419/opus-9312 fatcat:lgzn266dsnhwjbt2yt4n2lfsqi