Pub Date : 2011-10-20DOI: 10.1109/ICDKE.2011.6053919
J. Rauch, M. Simunek
Experiments concerning dealing with domain knowledge in association rules mining are presented. Formalized items of domain knowledge are used. Each such item is converted into a set of all association rules that can be considered as its consequences.
{"title":"Dealing with domain knowledge in association rules mining — Several experiments","authors":"J. Rauch, M. Simunek","doi":"10.1109/ICDKE.2011.6053919","DOIUrl":"https://doi.org/10.1109/ICDKE.2011.6053919","url":null,"abstract":"Experiments concerning dealing with domain knowledge in association rules mining are presented. Formalized items of domain knowledge are used. Each such item is converted into a set of all association rules that can be considered as its consequences.","PeriodicalId":377148,"journal":{"name":"2011 International Conference on Data and Knowledge Engineering (ICDKE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-20DOI: 10.1109/ICDKE.2011.6053921
Qing Liu, Ji Zhang, J. Forbes, Kai Xu, Dinesh Nair
Scientific research has moved from an isolated environment into a collaborated culture due to data explosion and the experiment complexity. There are strong demands to track and share the data sources and the analysis processes that generate particular results and conclusions. However, the existing systems do not support well the end-to-end data analysis and sharing environment which involves searching information, conducting experiments and sharing results. In this work, we present a process provenance service system which supports the scientific collaboration.
{"title":"A process provenance service system for scientific data analysis and sharing","authors":"Qing Liu, Ji Zhang, J. Forbes, Kai Xu, Dinesh Nair","doi":"10.1109/ICDKE.2011.6053921","DOIUrl":"https://doi.org/10.1109/ICDKE.2011.6053921","url":null,"abstract":"Scientific research has moved from an isolated environment into a collaborated culture due to data explosion and the experiment complexity. There are strong demands to track and share the data sources and the analysis processes that generate particular results and conclusions. However, the existing systems do not support well the end-to-end data analysis and sharing environment which involves searching information, conducting experiments and sharing results. In this work, we present a process provenance service system which supports the scientific collaboration.","PeriodicalId":377148,"journal":{"name":"2011 International Conference on Data and Knowledge Engineering (ICDKE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-20DOI: 10.1109/ICDKE.2011.6053929
R. Addie, Sam Moffatt, Stijn Dekeyser, A. Colman
The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary access rule evaluations is a major challenge in the formulation of good security architecture. This paper provides five examples of security in web services. which illustrate this tension. These examples highlight the need for more expressiveness in the rules used to express policies in three cases, and in the other the fact that XACML appears to have nearly adequate expressiveness without undue complexity. Each example is expressed first informally, by describing a service which could concievably be provided in a web services architecture, then the example is also outlined using either XACML, first order logic or both.
{"title":"Five examples of web-services for illustrating requirements for security architecture","authors":"R. Addie, Sam Moffatt, Stijn Dekeyser, A. Colman","doi":"10.1109/ICDKE.2011.6053929","DOIUrl":"https://doi.org/10.1109/ICDKE.2011.6053929","url":null,"abstract":"The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary access rule evaluations is a major challenge in the formulation of good security architecture. This paper provides five examples of security in web services. which illustrate this tension. These examples highlight the need for more expressiveness in the rules used to express policies in three cases, and in the other the fact that XACML appears to have nearly adequate expressiveness without undue complexity. Each example is expressed first informally, by describing a service which could concievably be provided in a web services architecture, then the example is also outlined using either XACML, first order logic or both.","PeriodicalId":377148,"journal":{"name":"2011 International Conference on Data and Knowledge Engineering (ICDKE)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133878573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}