Formal Concept Analysis

Size: px
Start display at page:

Download "Formal Concept Analysis"

Transcription

1 Formal Concept Analysis Applications Robert Jäschke Asmelash Teka Hadgu FG Wissensbasierte Systeme/L3S Research Center Leibniz Universität Hannover Robert Jäschke (FG KBS) Formal Concept Analysis 1 / 13

2 History of Formal Concept Analysis Formal Concept Analysis (FCA) originated in Darmstadt, Germany around 1980 as a mathematical theory that delivers a formalization of the concept of a concept. Since then, FCA spread into different areas of computer science, e.g., data analysis knowledge discovery software engineering Starting from datasets, FCA derives concept hierarchies. FCA allows you to create and visualize concept hierarchies based on well-grounded mathematical foundations. Robert Jäschke (FG KBS) Formal Concept Analysis 2 / 13

3 Example: Comparison of Coffee Machines Robert Jäschke (FG KBS) Formal Concept Analysis 3 / 13

4 Database Marketing at Jelmoli AG, Zurich travel accessoires perfumery ladies accessoires <= > <= >100 <= >400 = > J. Hereth, G. Stumme, R. Wille, and U. Wille. Conceptual knowledge discovery and data analysis. In Proc. ICCS 2000, volume 1867 of LNCS, pages Springer, Berlin/Heidelberg, Robert Jäschke (FG KBS) Formal Concept Analysis 4 / 13

5 Analysis of Plane Movements at Frankfurt Airport 2 O12 Ort der benötigten Staubahn [SBE] G12a Positionen (grobe Struktur) [POS] T2 W V G T1 M keine Angabe sonst. Angaben Halle A Halle B Halle C Halle Mitte Terminal 2 Vorfeld V3 keine unbekannte G. Stumme, R. Wille, and U. Wille. Conceptual knowledge discovery in databases using formal concept analysis methods. In Proc. PKDD, volume 1510 of LNCS, pages Springer, Berlin/Heidelberg, Robert Jäschke (FG KBS) Formal Concept Analysis 5 / 13

6 IT Security Management 3 S4.39 Deactivation for periods of absence S2.54 Procurement/selection of suitable answering machines S3.16 Briefing personnel on the operation of answering machines S2.4 Maintenance/repair regulations T4.1 Disruption of power supply S2.57 Regular playback and deletion of recorded messages S2.11 Provisions governing the use of security codes S1.29 Adequate siting of an IT system S4.38 Deactivation of unneccessary service features S2.55 Use of security code S6.40 Regular battery checks/replacements T2.5 Lack of, or inadequate, maintenance T4.18 Discharged or fatigued emergency power supply T2.1 Lack of, or insufficient, rules T3.15 Incorrect operation of answering machines T1.8 Dust, soiling T5.37 Determining security codes T4.19 Information loss due to full storage medium S2.56 Avoidance of confidential information S2.58 Limitation of message time S1.23 Locked doors T2.6 unauthorized access to rooms requiring protection T5.36 Deliberate overloading of answering machines T5.38 Misuse of remote inquiry features 3 K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Conceptual information systems discussed through an it-security tool. In Rose Dieng and Olivier Corby, editors, Knowledge Engineering and Knowledge Management Methods, Models, and Tools, volume 1937 of LNCS, pages Springer, Berlin/Heidelberg, Robert Jäschke (FG KBS) Formal Concept Analysis 6 / 13

7 Text Clustering 4 4 A. Hotho, S. Staab, G. Stumme. Ontologies improve text document clustering. In Proc. ICDM, pages , Robert Jäschke (FG KBS) Formal Concept Analysis 7 / 13

8 Concept Manager Conferences/ICCS2000 vs. AUSTRALIA/eklund.peter conventional programs store mails in a tree structure only one search path exists which must already been set when saving the mail Robert Jäschke (FG KBS) Formal Concept Analysis 8 / 13

9 Concept Manager In CEM an can be tagged with several keywords. Robert Jäschke (FG KBS) Formal Concept Analysis 9 / 13

10 Concept Manager Several search paths are possible: Darmstadt/KVO/KVO Members KVO/Darmstadt/KVO Members KVO/KVO Members/Darmstadt Robert Jäschke (FG KBS) Formal Concept Analysis 10 / 13

11 Concept Manager Mails from sub-folders can also be found in parent folders. Several search paths are possible: Darmstadt/KVO/KVO Members KVO/Darmstadt/KVO Members KVO/KVO Members/Darmstadt Robert Jäschke (FG KBS) Formal Concept Analysis 11 / 13

12 Concept Manager Several views can be combined. Robert Jäschke (FG KBS) Formal Concept Analysis 12 / 13

13 CUBIST Visual Analytics Robert Jäschke (FG KBS) Formal Concept Analysis 13 / 13

About Universality and Flexibility of FCA-based Software Tools

About Universality and Flexibility of FCA-based Software Tools About Universality and Flexibility of FCA-based Software Tools A.A. Neznanov, A.A. Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia [email protected],

More information

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent

More information

A Finite State Model for On-Line Analytical Processing in Triadic Contexts

A Finite State Model for On-Line Analytical Processing in Triadic Contexts A Finite State odel for On-Line Analytical Processing in Triadic Contexts erd Stumme Chair of Knowledge & Data Engineering, Department of athematics and Computer Science, University of Kassel, Wilhelmshöher

More information

Query-Based Multicontexts for Knowledge Base Browsing: an Evaluation

Query-Based Multicontexts for Knowledge Base Browsing: an Evaluation Query-Based Multicontexts for Knowledge Base Browsing: an Evaluation Julien Tane, Phillip Cimiano, and Pascal Hitzler AIFB, Universität Karlsruhe (TH) 76128 Karlsruhe, Germany {jta,pci,hitzler}@aifb.uni-karlsruhe.de

More information

Conceptual Knowledge Discovery and Data Analysis

Conceptual Knowledge Discovery and Data Analysis Conceptual Knowledge Discovery and Data Analysis Joachim Hereth 1, Gerd Stumme 1, Rudolf Wille 1, and Uta Wille 2 1 Technische Universität Darmstadt, Fachbereich Mathematik, Schloßgartenstr. 7, D 64289

More information

Chapter 15: Computer Security and Privacy

Chapter 15: Computer Security and Privacy Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some

More information

Guide to Pro Spam Remove

Guide to Pro Spam Remove Guide to Pro Spam Remove 1) SUMMARY 2) BASIC INSTRUCTIONS 3) CONFIGURATION 4) FILTER 5) E-MAIL ARCHIVE 6) FINAL NOTES 1) SUMMARY Pro Spam Remove is a software product that locks out all the spam received

More information

Release Notes, February 2009

Release Notes, February 2009 Release Notes, February 2009 Contents New Design... 2 Drag & Drop File Transfer... 2 Remote Sound... 3 Settings on the Remote Control Toolbar... 3 Remote Sound Preferences... 3 Increased Control over Remote

More information

Microsoft Outlook 2007: Advanced Topics

Microsoft Outlook 2007: Advanced Topics Microsoft Outlook 2007: Advanced Topics Arizona Board of Regents, 2010 THE UNIVERSITY OF ARIZONA 10.11.2010 v.1.00 For information and permission to use our PDF manuals, please contact [email protected]

More information

Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg

Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg FCA-SE 10 Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg FCA-SE 20 Contents 1 The role of concepts in software development

More information

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services 1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system

More information

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

IBM Tivoli Storage Manager for Microsoft SharePoint

IBM Tivoli Storage Manager for Microsoft SharePoint IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS

More information

Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives

Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives Exploring Microsoft Access 2010 by Robert Grauer, Keith Mast, Mary Anne Poatsy Chapter 1 Introduction to Access Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. 1 Objectives Navigate

More information

Full-text Search in Intermediate Data Storage of FCART

Full-text Search in Intermediate Data Storage of FCART Full-text Search in Intermediate Data Storage of FCART Alexey Neznanov, Andrey Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia [email protected],

More information

Computing Services Information Security Office. Security 101

Computing Services Information Security Office. Security 101 Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,

More information

Appendix F.: The Contract with Struktur AG, Sttugart, Germany 01/29

Appendix F.: The Contract with Struktur AG, Sttugart, Germany 01/29 Appendix F.: The Contract with Struktur AG, Sttugart, Germany 01/29 Author: Vincent, Chung-Wei Lin 林 崇 偉 P.148 Appendix F.: The Contract with Struktur AG, Sttugart, Germany 02/29 Author: Vincent, Chung-Wei

More information

Ontology-Based Filtering Mechanisms for Web Usage Patterns Retrieval

Ontology-Based Filtering Mechanisms for Web Usage Patterns Retrieval Ontology-Based Filtering Mechanisms for Web Usage Patterns Retrieval Mariângela Vanzin, Karin Becker, and Duncan Dubugras Alcoba Ruiz Faculdade de Informática - Pontifícia Universidade Católica do Rio

More information

HP Quality Center. Software Version: 9.20. Version Control Add-in Guide

HP Quality Center. Software Version: 9.20. Version Control Add-in Guide HP Quality Center Software Version: 9.20 Version Control Add-in Guide Document Number: QCGENVC9.2/01 Document Release Date: May 2007 Software Release Date: May 2007 Legal Notices Warranty The only warranties

More information

ANSYS EKM Overview. What is EKM?

ANSYS EKM Overview. What is EKM? ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes

More information

1/4/12 Installing and Configuring WebDAV on IIS 7 : WebDAV for IIS 7.0 : Publishing Content to Web Sites : T

1/4/12 Installing and Configuring WebDAV on IIS 7 : WebDAV for IIS 7.0 : Publishing Content to Web Sites : T Home > Learn > Deploying Web Sites on IIS 7 > Publishing Content to Web Sites > WebDAV for IIS 7.0 > Installing and Configuring WebDAV on IIS 7 Installing and Configuring WebDAV on IIS 7 Author: Robert

More information

StarWind iscsi SAN Software: Using with Citrix XenServer

StarWind iscsi SAN Software: Using with Citrix XenServer StarWind iscsi SAN Software: Using with Citrix XenServer www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this publication

More information

Configuration and Utilization of the OLAP Cache to Improve the Query Response Time

Configuration and Utilization of the OLAP Cache to Improve the Query Response Time Configuration and Utilization of the OLAP Cache to Improve the Query Response Time Applies to: SAP NetWeaver BW 7.0 Summary This paper outlines the steps to improve the Query response time by using the

More information

A STUDY IN USER-CENTRIC DATA INTEGRATION

A STUDY IN USER-CENTRIC DATA INTEGRATION A STUDY IN USER-CENTRIC DATA INTEGRATION Heiner Stuckenschmidt 1 2, Jan Noessner 1, and Faraz Fallahi 3 1 School of Business Informatics and Mathematics, University of Mannheim. 68159 Mannheim. Germany

More information

FCART: A New FCA-based System for Data Analysis and Knowledge Discovery

FCART: A New FCA-based System for Data Analysis and Knowledge Discovery FCART: A New FCA-based System for Data Analysis and Knowledge Discovery A.A. Neznanov, D.A. Ilvovsky, S.O. Kuznetsov National Research University Higher School of Economics, Pokrovskiy bd., 11, 109028,

More information

Technical Bulletin. SQL Express Backup Utility

Technical Bulletin. SQL Express Backup Utility Technical Bulletin SQL Express Backup Utility May 2012 Introduction This document describes the installation, configuration and use of the SATEON SQL Express Backup utility, which is used to provide scheduled

More information

Changing the C Interface IP Address: step-by-step

Changing the C Interface IP Address: step-by-step Changing the C Interface IP Address: step-by-step Topic 45020 / Updated: 23-March-2011 Applies To: Websense V10000 v7.6 Websense V10000 G2 v7.6 Websense V5000 G2 v7.6 Sometimes it is necessary to change

More information

Document Management User Guide

Document Management User Guide IBM TRIRIGA Version 10.3.2 Document Management User Guide Copyright IBM Corp. 2011 i Note Before using this information and the product it supports, read the information in Notices on page 37. This edition

More information

New in this release: On-Demand Sync. Known Issues: Limitations: Previous version features:

New in this release: On-Demand Sync. Known Issues: Limitations: Previous version features: New in this release: Basic Authentication Support for Restricted Zones Sync now supports accessing Restricted Zones when the NetScaler is configured for Basic Authentication Performance Improvements Improvements

More information

Monitoring BPMN-Processes with Rules in a Distributed Environment

Monitoring BPMN-Processes with Rules in a Distributed Environment Monitoring BPMN-Processes with Rules in a Distributed Environment Lothar Hotz 1, Stephanie von Riegen 1, Lars Braubach 2, Alexander Pokahr 2, and Torsten Schwinghammer 3 1 HITeC e.v. c/o Fachbereich Informatik,

More information

DocumentsCorePack for MS CRM 2011 Implementation Guide

DocumentsCorePack for MS CRM 2011 Implementation Guide DocumentsCorePack for MS CRM 2011 Implementation Guide Version 5.0 Implementation Guide (How to install/uninstall) The content of this document is subject to change without notice. Microsoft and Microsoft

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

Rational DOORS Next Generation. Quick Start Tutorial

Rational DOORS Next Generation. Quick Start Tutorial Rational DOORS Next Generation Quick Start Tutorial 1 Contents 1. Introduction... 2 2. Terminology... 3 3. Project Area Preparation... 3 3.1 Creating the project area... 3 4 Browsing Artifacts and Modules...

More information

Technical Documentation SEPPmail Outlook Add-In v1.5.3

Technical Documentation SEPPmail Outlook Add-In v1.5.3 Technical Documentation SEPPmail Outlook Add-In v1.5.3 This document describes how the SEPPmail Outlook Add-in works and the settings that can be configured. Page 2 Content 1 Introduction... 3 2 System

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

AxCMS.net on Network Load Balancing (NLB) Environment

AxCMS.net on Network Load Balancing (NLB) Environment AxCMS.net on Network Load Balancing (NLB) Environment This article contains step-by-step instructions on how to install AxCMS.net PremiumSample on a demo NLB cluster using IIS7. For installing on older

More information

A Comparison of Variable Selection Techniques for Credit Scoring

A Comparison of Variable Selection Techniques for Credit Scoring 1 A Comparison of Variable Selection Techniques for Credit Scoring K. Leung and F. Cheong and C. Cheong School of Business Information Technology, RMIT University, Melbourne, Victoria, Australia E-mail:

More information

Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY

Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY Policies Middletown Public Schools Employee Telecommunications Equipment and Use Policy No. EMPLOYEES TELECOMMUNICATIONS EQUIPMENT AND USE POLICY The Middletown Public Schools recognizes that the use of

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

Personal Digital Document Management

Personal Digital Document Management 1 Introduction 2 Personal Digital Document Management the process of acquiring, storing, managing, retrieving and using digital documents Sarah Henderson Department of Information Systems and Operations

More information

Compuprint 4247 Serial Matrix Printers

Compuprint 4247 Serial Matrix Printers Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and

More information

How To Create A Text Classification System For Spam Filtering

How To Create A Text Classification System For Spam Filtering Term Discrimination Based Robust Text Classification with Application to Email Spam Filtering PhD Thesis Khurum Nazir Junejo 2004-03-0018 Advisor: Dr. Asim Karim Department of Computer Science Syed Babar

More information

SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY

SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY SWAP: ONTOLOGY-BASED KNOWLEDGE MANAGEMENT WITH PEER-TO-PEER TECHNOLOGY M. EHRIG, C. TEMPICH AND S. STAAB Institute AIFB University of Karlsruhe 76128 Karlsruhe, Germany E-mail: {meh,cte,sst}@aifb.uni-karlsruhe.de

More information

Fight fire with fire when protecting sensitive data

Fight fire with fire when protecting sensitive data Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule

More information

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy USER GUIDE Unit 2: Synergy Chapter 2: Using Schoolwires Synergy Schoolwires Synergy & Assist Version 2.0 TABLE OF CONTENTS Introductions... 1 Audience... 1 Objectives... 1 Before You Begin... 1 Getting

More information

Different Types of Alerts for Process Chains. Table of Content

Different Types of Alerts for Process Chains. Table of Content Different Types of Alerts for Process Chains Applies to: This article applies to BW 3.x and SAP Business Intelligence (BI 7.0) with highest support package. For more information, visit the EDW homepage.

More information

Workflow Solutions for Very Large Workspaces

Workflow Solutions for Very Large Workspaces Workflow Solutions for Very Large Workspaces February 3, 2016 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Combi B PC software 8213X. Installation and operating instructions

Combi B PC software 8213X. Installation and operating instructions Combi B PC software 8213X Installation and operating instructions EN Table of Contents 1 Important notes... 3 2 Glossary of abbreviations and terms... 4 3 Symbols and special font types used... 5 4 Scope

More information

Comprehensive Guide to Moving a File Server to Google Drive

Comprehensive Guide to Moving a File Server to Google Drive Comprehensive Guide to Moving a File Server to Google Drive Brought to you by Google Gooru *To get notified of new updates to this Guide: Add us to your Circles on Google+ **For in-depth training on everything

More information

Workflow Object Driven Model

Workflow Object Driven Model Workflow Object Driven Model Włodzimierz Dąbrowski 1,2, Rafał Hryniów 2 Abstract: Within the last decade the workflow management makes an incredible career. Technology connected with the workflow management

More information

Montefiore Portal Quick Reference Guide

Montefiore Portal Quick Reference Guide Montefiore Portal Quick Reference Guide Montefiore s remote portal allows users to securely access Windows applications, file shares, internal web applications, and more. To use the Portal, you must already

More information

PCD Test Tools. These tools provide various test functions for the Power Chain Device Toolkit web services (BACnetWS+).

PCD Test Tools. These tools provide various test functions for the Power Chain Device Toolkit web services (BACnetWS+). PCD Test Tools The subfolders of this directory contain the install builds for the following tools: BnwsTest command line tool ImgMaker (formerly PxTkImgMaker) PunchingBag toolkit simulation server BACnetWsPlusTester.exe

More information

Qualitative Social Research for Rural Development Studies

Qualitative Social Research for Rural Development Studies Qualitative Social Research for Rural Development Studies Computer Assisted Qualitative Data Analysis Software (CAQDAS): Applications Universität Hohenheim Inst. 490A 1 Outline Day 12 Principles of Computer

More information

Intellicus Cluster and Load Balancing- Linux. Version: 7.3

Intellicus Cluster and Load Balancing- Linux. Version: 7.3 Intellicus Cluster and Load Balancing- Linux Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Kaspersky Security Center 10 Getting Started

Kaspersky Security Center 10 Getting Started Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will

More information

Microsoft FTP Configuration Guide for Helm 4

Microsoft FTP Configuration Guide for Helm 4 for Helm 4 How to configure Microsoft FTP for use with Helm WebHost Automation Ltd http://www.webhostautomation.com/ January 2007 Doc: HELM 4.0.0.0 Complying with all applicable copyright laws is the responsibility

More information

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: [email protected] Fax: +49

More information

Exporting emails from Outlook Version 1.00

Exporting emails from Outlook Version 1.00 Exporting emails from Outlook Version 1.00 The rapid growth in volume of emails means that there is a growing need to archive old emails to media such as external hard disks and DVD s. The document will

More information

Efficient Spam Email Filtering using Adaptive Ontology

Efficient Spam Email Filtering using Adaptive Ontology Efficient Spam Email Filtering using Adaptive Ontology Seongwook Youn and Dennis McLeod Computer Science Department, University of Southern California Los Angeles, CA 90089, USA {syoun, mcleod}@usc.edu

More information

Anomaly Detection and Predictive Maintenance

Anomaly Detection and Predictive Maintenance Anomaly Detection and Predictive Maintenance Rosaria Silipo Iris Adae Christian Dietz Phil Winters [email protected] [email protected] [email protected] [email protected]

More information

Big Data Governance Certification Self-Study Kit Bundle

Big Data Governance Certification Self-Study Kit Bundle Big Data Governance Certification Bundle This certification bundle provides you with the self-study materials you need to prepare for the exams required to complete the Big Data Governance Certification.

More information

Inspection, Testing and Maintenance

Inspection, Testing and Maintenance Page 18 ABOUT CODE CORNER CCFS would like to remind you to check with your local Authority Having Jurisdiction (AHJ) for questions and opinions concerning your local Fire and Building Codes. The information

More information

EDIminer: A Toolset for Process Mining from EDI Messages

EDIminer: A Toolset for Process Mining from EDI Messages EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,

More information

Design Report: Resource Management Software CS400 Senior Design I

Design Report: Resource Management Software CS400 Senior Design I Design Report: Resource Management Software CS400 Senior Design I Mark Briggs Paul Knell John Schluechtermann Jeremy Vechinski Electrical Engineering and Computer Science Department Milwaukee School of

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system

More information

Advanced Analytics Course Series

Advanced Analytics Course Series SAS Education Advanced Analytics Course Series September / October 2015 Discover real value in your corporate data. www.sas.de/education/analytics SAS Education Analytical Concepts Learn How to Explore

More information

WHAT S NEW 4.5. FileAudit VERSION. www.isdecisions.com

WHAT S NEW 4.5. FileAudit VERSION. www.isdecisions.com WHAT S NEW FileAudit 4.5 VERSION www.isdecisions.com Table of Contents 1. FileAudit Version 4... 3 1.1. File and Folder Activity Real-Time Monitoring... 3 1.2. File and Folder Activity Alerts... 3 1.3.

More information

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments A Secure Shell Key Management White Paper Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments Emerging trends impacting PCI-DSS compliance requirements in secure shell deployments

More information

Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER

Librarian. Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER Librarian Integrating Secure Workflow and Revision Control into Your Production Environment WHITE PAPER Contents Overview 3 File Storage and Management 4 The Library 4 Folders, Files and File History 4

More information