Formal Concept Analysis
|
|
|
- Muriel Reed
- 9 years ago
- Views:
Transcription
1 Formal Concept Analysis Applications Robert Jäschke Asmelash Teka Hadgu FG Wissensbasierte Systeme/L3S Research Center Leibniz Universität Hannover Robert Jäschke (FG KBS) Formal Concept Analysis 1 / 13
2 History of Formal Concept Analysis Formal Concept Analysis (FCA) originated in Darmstadt, Germany around 1980 as a mathematical theory that delivers a formalization of the concept of a concept. Since then, FCA spread into different areas of computer science, e.g., data analysis knowledge discovery software engineering Starting from datasets, FCA derives concept hierarchies. FCA allows you to create and visualize concept hierarchies based on well-grounded mathematical foundations. Robert Jäschke (FG KBS) Formal Concept Analysis 2 / 13
3 Example: Comparison of Coffee Machines Robert Jäschke (FG KBS) Formal Concept Analysis 3 / 13
4 Database Marketing at Jelmoli AG, Zurich travel accessoires perfumery ladies accessoires <= > <= >100 <= >400 = > J. Hereth, G. Stumme, R. Wille, and U. Wille. Conceptual knowledge discovery and data analysis. In Proc. ICCS 2000, volume 1867 of LNCS, pages Springer, Berlin/Heidelberg, Robert Jäschke (FG KBS) Formal Concept Analysis 4 / 13
5 Analysis of Plane Movements at Frankfurt Airport 2 O12 Ort der benötigten Staubahn [SBE] G12a Positionen (grobe Struktur) [POS] T2 W V G T1 M keine Angabe sonst. Angaben Halle A Halle B Halle C Halle Mitte Terminal 2 Vorfeld V3 keine unbekannte G. Stumme, R. Wille, and U. Wille. Conceptual knowledge discovery in databases using formal concept analysis methods. In Proc. PKDD, volume 1510 of LNCS, pages Springer, Berlin/Heidelberg, Robert Jäschke (FG KBS) Formal Concept Analysis 5 / 13
6 IT Security Management 3 S4.39 Deactivation for periods of absence S2.54 Procurement/selection of suitable answering machines S3.16 Briefing personnel on the operation of answering machines S2.4 Maintenance/repair regulations T4.1 Disruption of power supply S2.57 Regular playback and deletion of recorded messages S2.11 Provisions governing the use of security codes S1.29 Adequate siting of an IT system S4.38 Deactivation of unneccessary service features S2.55 Use of security code S6.40 Regular battery checks/replacements T2.5 Lack of, or inadequate, maintenance T4.18 Discharged or fatigued emergency power supply T2.1 Lack of, or insufficient, rules T3.15 Incorrect operation of answering machines T1.8 Dust, soiling T5.37 Determining security codes T4.19 Information loss due to full storage medium S2.56 Avoidance of confidential information S2.58 Limitation of message time S1.23 Locked doors T2.6 unauthorized access to rooms requiring protection T5.36 Deliberate overloading of answering machines T5.38 Misuse of remote inquiry features 3 K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Conceptual information systems discussed through an it-security tool. In Rose Dieng and Olivier Corby, editors, Knowledge Engineering and Knowledge Management Methods, Models, and Tools, volume 1937 of LNCS, pages Springer, Berlin/Heidelberg, Robert Jäschke (FG KBS) Formal Concept Analysis 6 / 13
7 Text Clustering 4 4 A. Hotho, S. Staab, G. Stumme. Ontologies improve text document clustering. In Proc. ICDM, pages , Robert Jäschke (FG KBS) Formal Concept Analysis 7 / 13
8 Concept Manager Conferences/ICCS2000 vs. AUSTRALIA/eklund.peter conventional programs store mails in a tree structure only one search path exists which must already been set when saving the mail Robert Jäschke (FG KBS) Formal Concept Analysis 8 / 13
9 Concept Manager In CEM an can be tagged with several keywords. Robert Jäschke (FG KBS) Formal Concept Analysis 9 / 13
10 Concept Manager Several search paths are possible: Darmstadt/KVO/KVO Members KVO/Darmstadt/KVO Members KVO/KVO Members/Darmstadt Robert Jäschke (FG KBS) Formal Concept Analysis 10 / 13
11 Concept Manager Mails from sub-folders can also be found in parent folders. Several search paths are possible: Darmstadt/KVO/KVO Members KVO/Darmstadt/KVO Members KVO/KVO Members/Darmstadt Robert Jäschke (FG KBS) Formal Concept Analysis 11 / 13
12 Concept Manager Several views can be combined. Robert Jäschke (FG KBS) Formal Concept Analysis 12 / 13
13 CUBIST Visual Analytics Robert Jäschke (FG KBS) Formal Concept Analysis 13 / 13
About Universality and Flexibility of FCA-based Software Tools
About Universality and Flexibility of FCA-based Software Tools A.A. Neznanov, A.A. Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia [email protected],
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
A Finite State Model for On-Line Analytical Processing in Triadic Contexts
A Finite State odel for On-Line Analytical Processing in Triadic Contexts erd Stumme Chair of Knowledge & Data Engineering, Department of athematics and Computer Science, University of Kassel, Wilhelmshöher
Query-Based Multicontexts for Knowledge Base Browsing: an Evaluation
Query-Based Multicontexts for Knowledge Base Browsing: an Evaluation Julien Tane, Phillip Cimiano, and Pascal Hitzler AIFB, Universität Karlsruhe (TH) 76128 Karlsruhe, Germany {jta,pci,hitzler}@aifb.uni-karlsruhe.de
Conceptual Knowledge Discovery and Data Analysis
Conceptual Knowledge Discovery and Data Analysis Joachim Hereth 1, Gerd Stumme 1, Rudolf Wille 1, and Uta Wille 2 1 Technische Universität Darmstadt, Fachbereich Mathematik, Schloßgartenstr. 7, D 64289
Chapter 15: Computer Security and Privacy
Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some
Guide to Pro Spam Remove
Guide to Pro Spam Remove 1) SUMMARY 2) BASIC INSTRUCTIONS 3) CONFIGURATION 4) FILTER 5) E-MAIL ARCHIVE 6) FINAL NOTES 1) SUMMARY Pro Spam Remove is a software product that locks out all the spam received
Release Notes, February 2009
Release Notes, February 2009 Contents New Design... 2 Drag & Drop File Transfer... 2 Remote Sound... 3 Settings on the Remote Control Toolbar... 3 Remote Sound Preferences... 3 Increased Control over Remote
Microsoft Outlook 2007: Advanced Topics
Microsoft Outlook 2007: Advanced Topics Arizona Board of Regents, 2010 THE UNIVERSITY OF ARIZONA 10.11.2010 v.1.00 For information and permission to use our PDF manuals, please contact [email protected]
Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg
FCA-SE 10 Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg FCA-SE 20 Contents 1 The role of concepts in software development
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
IBM Tivoli Storage Manager for Microsoft SharePoint
IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS
Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives
Exploring Microsoft Access 2010 by Robert Grauer, Keith Mast, Mary Anne Poatsy Chapter 1 Introduction to Access Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. 1 Objectives Navigate
Full-text Search in Intermediate Data Storage of FCART
Full-text Search in Intermediate Data Storage of FCART Alexey Neznanov, Andrey Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia [email protected],
Computing Services Information Security Office. Security 101
Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,
Appendix F.: The Contract with Struktur AG, Sttugart, Germany 01/29
Appendix F.: The Contract with Struktur AG, Sttugart, Germany 01/29 Author: Vincent, Chung-Wei Lin 林 崇 偉 P.148 Appendix F.: The Contract with Struktur AG, Sttugart, Germany 02/29 Author: Vincent, Chung-Wei
Ontology-Based Filtering Mechanisms for Web Usage Patterns Retrieval
Ontology-Based Filtering Mechanisms for Web Usage Patterns Retrieval Mariângela Vanzin, Karin Becker, and Duncan Dubugras Alcoba Ruiz Faculdade de Informática - Pontifícia Universidade Católica do Rio
HP Quality Center. Software Version: 9.20. Version Control Add-in Guide
HP Quality Center Software Version: 9.20 Version Control Add-in Guide Document Number: QCGENVC9.2/01 Document Release Date: May 2007 Software Release Date: May 2007 Legal Notices Warranty The only warranties
ANSYS EKM Overview. What is EKM?
ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes
1/4/12 Installing and Configuring WebDAV on IIS 7 : WebDAV for IIS 7.0 : Publishing Content to Web Sites : T
Home > Learn > Deploying Web Sites on IIS 7 > Publishing Content to Web Sites > WebDAV for IIS 7.0 > Installing and Configuring WebDAV on IIS 7 Installing and Configuring WebDAV on IIS 7 Author: Robert
StarWind iscsi SAN Software: Using with Citrix XenServer
StarWind iscsi SAN Software: Using with Citrix XenServer www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this publication
Configuration and Utilization of the OLAP Cache to Improve the Query Response Time
Configuration and Utilization of the OLAP Cache to Improve the Query Response Time Applies to: SAP NetWeaver BW 7.0 Summary This paper outlines the steps to improve the Query response time by using the
A STUDY IN USER-CENTRIC DATA INTEGRATION
A STUDY IN USER-CENTRIC DATA INTEGRATION Heiner Stuckenschmidt 1 2, Jan Noessner 1, and Faraz Fallahi 3 1 School of Business Informatics and Mathematics, University of Mannheim. 68159 Mannheim. Germany
FCART: A New FCA-based System for Data Analysis and Knowledge Discovery
FCART: A New FCA-based System for Data Analysis and Knowledge Discovery A.A. Neznanov, D.A. Ilvovsky, S.O. Kuznetsov National Research University Higher School of Economics, Pokrovskiy bd., 11, 109028,
Technical Bulletin. SQL Express Backup Utility
Technical Bulletin SQL Express Backup Utility May 2012 Introduction This document describes the installation, configuration and use of the SATEON SQL Express Backup utility, which is used to provide scheduled
Changing the C Interface IP Address: step-by-step
Changing the C Interface IP Address: step-by-step Topic 45020 / Updated: 23-March-2011 Applies To: Websense V10000 v7.6 Websense V10000 G2 v7.6 Websense V5000 G2 v7.6 Sometimes it is necessary to change
Document Management User Guide
IBM TRIRIGA Version 10.3.2 Document Management User Guide Copyright IBM Corp. 2011 i Note Before using this information and the product it supports, read the information in Notices on page 37. This edition
New in this release: On-Demand Sync. Known Issues: Limitations: Previous version features:
New in this release: Basic Authentication Support for Restricted Zones Sync now supports accessing Restricted Zones when the NetScaler is configured for Basic Authentication Performance Improvements Improvements
Monitoring BPMN-Processes with Rules in a Distributed Environment
Monitoring BPMN-Processes with Rules in a Distributed Environment Lothar Hotz 1, Stephanie von Riegen 1, Lars Braubach 2, Alexander Pokahr 2, and Torsten Schwinghammer 3 1 HITeC e.v. c/o Fachbereich Informatik,
DocumentsCorePack for MS CRM 2011 Implementation Guide
DocumentsCorePack for MS CRM 2011 Implementation Guide Version 5.0 Implementation Guide (How to install/uninstall) The content of this document is subject to change without notice. Microsoft and Microsoft
1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
Rational DOORS Next Generation. Quick Start Tutorial
Rational DOORS Next Generation Quick Start Tutorial 1 Contents 1. Introduction... 2 2. Terminology... 3 3. Project Area Preparation... 3 3.1 Creating the project area... 3 4 Browsing Artifacts and Modules...
Technical Documentation SEPPmail Outlook Add-In v1.5.3
Technical Documentation SEPPmail Outlook Add-In v1.5.3 This document describes how the SEPPmail Outlook Add-in works and the settings that can be configured. Page 2 Content 1 Introduction... 3 2 System
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
AxCMS.net on Network Load Balancing (NLB) Environment
AxCMS.net on Network Load Balancing (NLB) Environment This article contains step-by-step instructions on how to install AxCMS.net PremiumSample on a demo NLB cluster using IIS7. For installing on older
A Comparison of Variable Selection Techniques for Credit Scoring
1 A Comparison of Variable Selection Techniques for Credit Scoring K. Leung and F. Cheong and C. Cheong School of Business Information Technology, RMIT University, Melbourne, Victoria, Australia E-mail:
Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY
Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy No. EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY The Middletown Public Schools recognizes that the use of
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
Personal Digital Document Management
1 Introduction 2 Personal Digital Document Management the process of acquiring, storing, managing, retrieving and using digital documents Sarah Henderson Department of Information Systems and Operations
Compuprint 4247 Serial Matrix Printers
Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and
How To Create A Text Classification System For Spam Filtering
Term Discrimination Based Robust Text Classification with Application to Email Spam Filtering PhD Thesis Khurum Nazir Junejo 2004-03-0018 Advisor: Dr. Asim Karim Department of Computer Science Syed Babar
SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY
SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY M. EHRIG, C. TEMPICH AND S. STAAB Institute AIFB University of Karlsruhe 76128 Karlsruhe, Germany E-mail: {meh,cte,sst}@aifb.uni-karlsruhe.de
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy
USER GUIDE Unit 2: Synergy Chapter 2: Using Schoolwires Synergy Schoolwires Synergy & Assist Version 2.0 TABLE OF CONTENTS Introductions... 1 Audience... 1 Objectives... 1 Before You Begin... 1 Getting
Different Types of Alerts for Process Chains. Table of Content
Different Types of Alerts for Process Chains Applies to: This article applies to BW 3.x and SAP Business Intelligence (BI 7.0) with highest support package. For more information, visit the EDW homepage.
Workflow Solutions for Very Large Workspaces
Workflow Solutions for Very Large Workspaces February 3, 2016 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Combi B PC software 8213X. Installation and operating instructions
Combi B PC software 8213X Installation and operating instructions EN Table of Contents 1 Important notes... 3 2 Glossary of abbreviations and terms... 4 3 Symbols and special font types used... 5 4 Scope
Comprehensive Guide to Moving a File Server to Google Drive
Comprehensive Guide to Moving a File Server to Google Drive Brought to you by Google Gooru *To get notified of new updates to this Guide: Add us to your Circles on Google+ **For in-depth training on everything
Workflow Object Driven Model
Workflow Object Driven Model Włodzimierz Dąbrowski 1,2, Rafał Hryniów 2 Abstract: Within the last decade the workflow management makes an incredible career. Technology connected with the workflow management
Montefiore Portal Quick Reference Guide
Montefiore Portal Quick Reference Guide Montefiore s remote portal allows users to securely access Windows applications, file shares, internal web applications, and more. To use the Portal, you must already
PCD Test Tools. These tools provide various test functions for the Power Chain Device Toolkit web services (BACnetWS+).
PCD Test Tools The subfolders of this directory contain the install builds for the following tools: BnwsTest command line tool ImgMaker (formerly PxTkImgMaker) PunchingBag toolkit simulation server BACnetWsPlusTester.exe
Qualitative Social Research for Rural Development Studies
Qualitative Social Research for Rural Development Studies Computer Assisted Qualitative Data Analysis Software (CAQDAS): Applications Universität Hohenheim Inst. 490A 1 Outline Day 12 Principles of Computer
Intellicus Cluster and Load Balancing- Linux. Version: 7.3
Intellicus Cluster and Load Balancing- Linux Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Kaspersky Security Center 10 Getting Started
Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will
Microsoft FTP Configuration Guide for Helm 4
for Helm 4 How to configure Microsoft FTP for use with Helm WebHost Automation Ltd http://www.webhostautomation.com/ January 2007 Doc: HELM 4.0.0.0 Complying with all applicable copyright laws is the responsibility
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: [email protected] Fax: +49
Exporting emails from Outlook Version 1.00
Exporting emails from Outlook Version 1.00 The rapid growth in volume of emails means that there is a growing need to archive old emails to media such as external hard disks and DVD s. The document will
Efficient Spam Email Filtering using Adaptive Ontology
Efficient Spam Email Filtering using Adaptive Ontology Seongwook Youn and Dennis McLeod Computer Science Department, University of Southern California Los Angeles, CA 90089, USA {syoun, mcleod}@usc.edu
Anomaly Detection and Predictive Maintenance
Anomaly Detection and Predictive Maintenance Rosaria Silipo Iris Adae Christian Dietz Phil Winters [email protected] [email protected] [email protected] [email protected]
Big Data Governance Certification Self-Study Kit Bundle
Big Data Governance Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Governance Certification.
Inspection, Testing and Maintenance
Page 18 ABOUT CODE CORNER CCFS would like to remind you to check with your local Authority Having Jurisdiction (AHJ) for questions and opinions concerning your local Fire and Building Codes. The information
EDIminer: A Toolset for Process Mining from EDI Messages
EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,
Design Report: Resource Management Software CS400 Senior Design I
Design Report: Resource Management Software CS400 Senior Design I Mark Briggs Paul Knell John Schluechtermann Jeremy Vechinski Electrical Engineering and Computer Science Department Milwaukee School of
DANGER indicates that death or severe personal injury will result if proper precautions are not taken.
Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system
Advanced Analytics Course Series
SAS Education Advanced Analytics Course Series September / October 2015 Discover real value in your corporate data. www.sas.de/education/analytics SAS Education Analytical Concepts Learn How to Explore
WHAT S NEW 4.5. FileAudit VERSION. www.isdecisions.com
WHAT S NEW FileAudit 4.5 VERSION www.isdecisions.com Table of Contents 1. FileAudit Version 4... 3 1.1. File and Folder Activity Real-Time Monitoring... 3 1.2. File and Folder Activity Alerts... 3 1.3.
Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments
A Secure Shell Key Management White Paper Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments Emerging trends impacting PCI-DSS compliance requirements in secure shell deployments
Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER
Librarian Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER Contents Overview 3 File Storage and Management 4 The Library 4 Folders, Files and File History 4
