Sciweavers

870 search results - page 174 / 174
» Is It Real, or Is It Randomized
Sort
View
ACSAC
2010
IEEE
12 years 9 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
IUI
2011
ACM
12 years 8 months ago
ChemInk: a natural real-time recognition system for chemical drawings
We describe a new sketch recognition framework for chemical structure drawings that combines multiple levels of visual features using a jointly trained conditional random field. ...
Tom Y. Ouyang, Randall Davis
AAAI
2011
12 years 5 months ago
Learned Behaviors of Multiple Autonomous Agents in Smart Grid Markets
One proposed approach to managing a large complex Smart Grid is through Broker Agents who buy electrical power from distributed producers, and also sell power to consumers, via a ...
Prashant P. Reddy, Manuela M. Veloso
KDD
2012
ACM
164views Data Mining» more  KDD 2012»
11 years 7 months ago
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs
Blockmodelling is an important technique for decomposing graphs into sets of roles. Vertices playing the same role have similar patterns of interactions with vertices in other rol...
Jeffrey Chan, Wei Liu, Christopher Leckie, James B...
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 7 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu