Filters








2,622 Hits in 7.7 sec

Pattern for Re-engineering a Classification Scheme, which Follows the Path Enumeration Data Model, to a Taxonomy

Boris Villazón-Terrazas, Mari Carmen Suárez-Figueroa, Asunción Gómez-Pérez
2009 International Semantic Web Conference  
This work has been partially supported by the European Comission projects NeOn(FP6-027595) and SEEMP(FP6-027347), as well as by an R+D grant from the UPM.  ...  Pattern Problem Re-engineering a classification scheme, which follows the path enumeration model, to design a taxonomy.  ...  Summary and Future Work We have presented a pattern for transforming a classification scheme, which is modelled following the path enumeration data model, into a taxonomy.  ... 
dblp:conf/semweb/Villazon-TerrazasSG09a fatcat:tudcsrrtb5h4tlj643fjnlsr5a

Statistically-Robust Clustering Techniques for Mapping Spatial Hotspots: A Survey [article]

Yiqun Xie, Shashi Shekhar, Yan Li
2021 arXiv   pre-print
We first present a general taxonomy of the clustering process with statistical rigor, covering key steps of data and statistical modeling, region enumeration and maximization, significance testing, and  ...  To address this challenge, techniques for statistically-robust clustering have been extensively studied by the data mining and statistics communities.  ...  Table 1 shows a detailed taxonomy of various ways of classification.  ... 
arXiv:2103.12019v1 fatcat:3xnj7jlxzvcrnfkwzdrpoxgl24

Assessment of features technology

J.J. Shah
1991 Computer-Aided Design  
Features encapsulate the engineering significance of portions of the geometry of a part or assembly, and, as such, are important in product design, product definition, and reasoning, for a variety of applications  ...  Within each, there are several subcategories, which are discussed and compared in the paper. Also presented are several schemes popular for representing features.  ...  Special thanks are due to Palat Sreevalsan for the preparation of the manuscript of this paper.  ... 
doi:10.1016/0010-4485(91)90027-t fatcat:qil6h7utm5d5nmt3nflhv6s2ku

A taxonomy of attack mechanisms in the automotive domain

Irdin Pekaric, Clemens Sauerwein, Stefan Haselwanter, Michael Felderer
2021 Computer Standards & Interfaces  
As a result, multiple attack vectors aiming to disrupt different vehicle components emerged. Research and practice lack a comprehensive attack taxonomy for the automotive domain.  ...  In this regard, we conduct a systematic literature study, wherein 48 different attacks were identified and classified according to the proposed taxonomy of attack mechanisms.  ...  These domains were obtained from the Common Attack Pattern Enumeration and Classification (CAPEC) [15] attack database.  ... 
doi:10.1016/j.csi.2021.103539 fatcat:aat2nwxiezh4jk34jt4z6seq5a

Characterizing the usability of interactive applications through query log analysis

Adam Fourney, Richard Mann, Michael Terry
2011 Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11  
We demonstrate the utility of this approach by applying it to a number of popular software and hardware systems.  ...  In this paper, we introduce CUTS and describe an automated process for harvesting, ordering, labeling, filtering, and grouping search queries related to a given product.  ...  The first classification scheme is a taxonomy that extends previous search query taxonomies to include categories relevant to interactive systems.  ... 
doi:10.1145/1978942.1979205 dblp:conf/chi/FourneyMT11 fatcat:lhowz2uak5b55jiw6lyfnzz5ty

A review of threat modelling approaches for APT-style attacks

Matt Tatam, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti
2021 Heliyon  
The focus of this study is to determine TM limitations, strengths, and any perceivable gaps.  ...  Using this intelligence to minimise risk, requires a systematic methodology or framework that recognises every possible threat scenario.  ...  The authors declare no conflict of interest. Additional information No additional information is available for this paper.  ... 
doi:10.1016/j.heliyon.2021.e05969 pmid:33506133 pmcid:PMC7814160 fatcat:zif6ebwcqrhr7pkudsq2ynqpgm

Vulnerability Analysis in SOA-Based Business Processes

L. Lowis, R. Accorsi
2011 IEEE Transactions on Services Computing  
An additional contribution is a case study, in which we apply the new method to a SOA-based business process scenario.  ...  We present the method to search for vulnerability types in SOA-based business processes and services. Also, we show how patterns can be derived from these types, so that tools can be employed.  ...  We are prototyping a system that employs patterns (cf. vulnerability details in Section 3.3) to analyze either business process models or log files of their execution for vulnerabilities in the data and  ... 
doi:10.1109/tsc.2010.37 fatcat:a6ovh4jfhfhsjbkfcl4d2y5ceq

Data Science Competence Framework (Cf-Ds): Approach And Working Version

Yuri Demchenko, Adam Belloum, Tomasz Wiktorski
2016 Zenodo  
The presented Data Science Competence Framework is a product of the EDISON project The EDISON project is designed to create a foundation for establishing a new profession of Data Scientist for European  ...  CF-DS will provide a basis for Data Science Body of Knowledge (DS-BoK) and Model Curriculum (MC-DC) definitions, and further for the Data Science Professional certification.  ...  The CF-DS definition will re-use, extend and map the ESCO taxonomy to the identified Data Science competences and skills. e) ACM Computing Classification System (ACM CCS2012) [7]  Data Management,  ... 
doi:10.5281/zenodo.159438 fatcat:iq3ce3ygzbfvpmfgnxwyduappa

Edison Data Science Framework: Part 4. Data Science Professional Profiles (Dsp Profiles) Release 2

Yuri Demchenko, Tomasz Wiktorski, Adam Belloum
2017 Zenodo  
as well as advising practitioners on the (up/re-) skilling path.  ...  First of all. they will help organisations to plan their staffing for data related functions when migrating to agile data driven organizational model.  ...  The EDISON approach to defining the Data Science Model Curriculum follows a competence-base education model and can be summarized in the following steps: 1.  ... 
doi:10.5281/zenodo.1044364 fatcat:xfcq4bay35dlhds6zgrahcjw3q

Ontology Driven Text Mining for Cost Management Processes

Francesco Bellomi, Roberta Cuel, Roberto Biscaro
2005 Semantic Web Applications and Perspectives  
The system enables purchaser officers to search products through a semantic based engine, and navigate a semantic based catalogue in order to electronically buy the more suitable (less expensive) products  ...  This system is based on a domain-specific ontological model, developed according to a structured representation of purchasable items.  ...  For a general analysis of the text classification techniques based upon statistical data pattern analysis readers should refer to [Yang, 1999] .  ... 
dblp:conf/swap/BellomiCB05 fatcat:chxrykeluvatrjb33w7iddbdna

Component Based Development [article]

Debayan Bose
2010 arXiv   pre-print
Its benefits from the re-usability point of view is enormous. The intertwining relationship of domain engineering with component based software engineering is analyzed.  ...  Component Based Approach has been introduced in core engineering discipline long back but the introduction to component based concept in software perspective is recently developed by Object Management  ...  Actual components are listed at the lowest level of any path in the enumerated hierarchy. The hierarchical structure of an enumerated classification scheme makes it easy to understand and to use.  ... 
arXiv:1011.2163v1 fatcat:gq7xfegvxrhlvgem6bcxsmqjje

Generating attacks in SysML activity diagrams by detecting attack surfaces

Samir Ouchani, Gabriele Lenzini
2015 Journal of Ambient Intelligence and Humanized Computing  
We formalize a system as SysML activity diagrams and in the same formalism we model libraries of patterns taken from standard catalogues of social engineering and technical attacks.  ...  It represents a very common situation in the domain of communication and data security for corporations.  ...  Acknowledgments The research leading to the results presented in this work received funding from the Fonds National de la Recherche Luxembourg, project ''Socio-Technical Analysis of Security and Trust'  ... 
doi:10.1007/s12652-015-0269-8 fatcat:536eihludbgi7cmacv3h3ml43e

Heuristic classification

William J. Clancey
1985 Artificial Intelligence  
The heuristic classification problem-solving model provides a useful framework for characterizing kinds of problems, for designing representation tools, and for understanding non-classification (constructive  ...  These programs have a characteristic inference structure that systematically relates data to a pre-enumerated set of solutions by abstraction, heuristic association, and refinement.  ...  This is the pattern we follow in knowledge engineering, constantly decomposing terms into general types and relations to make explicit the rationale behind implications.  ... 
doi:10.1016/0004-3702(85)90016-5 fatcat:6fd7uqacc5eiflqi7ix6pxysia

Relationships at the Heart of Semantic Web: Modeling, Discovering, and Exploiting Complex Semantic Relationships [chapter]

Amit Sheth, I. Budak Arpinar, Vipul Kashyap
2004 Studies in Fuzziness and Soft Computing  
A user must decide which of the retrieved documents are relevant or within his information need context, and then use his mental model of the information sought to "process" the documents to obtain the  ...  dealing with data overload, which leads to Enhancing the Power of the Internet: Studies in Fuzziness and Soft Computingρ CONNECT (a, b ) [C, K] Given entities a, and b, ρ CONNECT treats the graph as an  ...  Acknowledgements Ideas presented in this chapter have benefited from team members at the LSDIS Lab  ... 
doi:10.1007/978-3-540-45218-8_4 fatcat:ko3yp5gklrcwlnnk23n2doqzb4

Privacy-preserving data publishing

Benjamin C. M. Fung, Ke Wang, Rui Chen, Philip S. Yu
2010 ACM Computing Surveys  
ACKNOWLEDGMENTS We sincerely thank the reviewers of this manuscript for greatly improving the quality of this survey.  ...  In this survey, data mining has a broad sense, not necessarily restricted to pattern mining or model building.  ...  The search space for this scheme is much smaller than the search space for other schemes below, but the data distortion is the largest because of the same granularity level requirement on all paths of  ... 
doi:10.1145/1749603.1749605 fatcat:ivbwule7bjafvmdvh236gbwryu
« Previous Showing results 1 — 15 out of 2,622 results