Episode 2

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Episode Matching

1 Dept. of Mathematical Sciences, The University of Memphis, Memphis TN 38152, USA; dasg~nathsci .msci .memphis. edu 2 Max-Planck Institut fiir Informatik, Im Stadtwald, Saarbriicken D-66123, Germany; {rudolf, leszek}0mpisb. mpg. de 3 IBM Almaden I%C k55/B1, 650 Harry Rd, CA 95120, USA; gunopulo@almaden, ibm. coT, 4 Dept. of Computer Science, P.O. Box 26, FIN-00014 University of Helsinki, Finla...

متن کامل

Quantitative Episode Trees

Among the family of the local patterns, episodes are commonly used when mining a single or multiple sequences of discrete events. An episode reflects a qualitative relation is-followed-by over event types, and the refinement of episodes to incorporate quantitative temporal information is still an on going research, with many application opportunities. In this paper, focusing on serial episodes,...

متن کامل

Care Episode Retrieval

The documentation of a care episode consists of clinical notes concerning patient care, concluded with a discharge summary. Care episodes are stored electronically and used throughout the health care sector by patients, administrators and professionals from different areas, primarily for clinical purposes, but also for secondary purposes such as decision support and research. A common use case ...

متن کامل

Revisiting Hungary’s Bankruptcy Episode

We take a retrospective look at Hungary’s experiment with a particularly draconian bankruptcy law. For an eighteen-month period in 1992–93, the Hungarian bankruptcy code contained an unusual automatic trigger that required the managers of firms that held overdue debts of any size to any creditor to initiate reorganisation or liquidation proceedings to avoid prosecution under the civil code. We ...

متن کامل

Episode Based Masquerade Detection

Masquerade detection is one of major concerns of system security research due to two main reasons. Such an attack cannot be detected at the time of access and any detection technique relies on user’s signature and even a legitimate user is likely to deviate from its usual usage pattern. In the recent years, there have been several proposals to efficiently detect masquerader while keeping the fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Japan Society for Precision Engineering

سال: 2017

ISSN: 0912-0289,1882-675X

DOI: 10.2493/jjspe.83.131