Episode 2
نویسندگان
چکیده
منابع مشابه
Episode Matching
1 Dept. of Mathematical Sciences, The University of Memphis, Memphis TN 38152, USA; dasg~nathsci .msci .memphis. edu 2 Max-Planck Institut fiir Informatik, Im Stadtwald, Saarbriicken D-66123, Germany; {rudolf, leszek}0mpisb. mpg. de 3 IBM Almaden I%C k55/B1, 650 Harry Rd, CA 95120, USA; gunopulo@almaden, ibm. coT, 4 Dept. of Computer Science, P.O. Box 26, FIN-00014 University of Helsinki, Finla...
متن کاملQuantitative Episode Trees
Among the family of the local patterns, episodes are commonly used when mining a single or multiple sequences of discrete events. An episode reflects a qualitative relation is-followed-by over event types, and the refinement of episodes to incorporate quantitative temporal information is still an on going research, with many application opportunities. In this paper, focusing on serial episodes,...
متن کاملCare Episode Retrieval
The documentation of a care episode consists of clinical notes concerning patient care, concluded with a discharge summary. Care episodes are stored electronically and used throughout the health care sector by patients, administrators and professionals from different areas, primarily for clinical purposes, but also for secondary purposes such as decision support and research. A common use case ...
متن کاملRevisiting Hungary’s Bankruptcy Episode
We take a retrospective look at Hungary’s experiment with a particularly draconian bankruptcy law. For an eighteen-month period in 1992–93, the Hungarian bankruptcy code contained an unusual automatic trigger that required the managers of firms that held overdue debts of any size to any creditor to initiate reorganisation or liquidation proceedings to avoid prosecution under the civil code. We ...
متن کاملEpisode Based Masquerade Detection
Masquerade detection is one of major concerns of system security research due to two main reasons. Such an attack cannot be detected at the time of access and any detection technique relies on user’s signature and even a legitimate user is likely to deviate from its usual usage pattern. In the recent years, there have been several proposals to efficiently detect masquerader while keeping the fa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Japan Society for Precision Engineering
سال: 2017
ISSN: 0912-0289,1882-675X
DOI: 10.2493/jjspe.83.131