Sciweavers

17 search results - page 3 / 4
» grc 2008
Sort
View
GRC
2008
IEEE
13 years 5 months ago
Towards Real-time Performance of Data Value Hiding for Frequent Data Updates
Hiding data values in privacy-preserving data mining (PPDM) protects information against unauthorized attacks while maintaining analytical data properties. The most popular models...
Jie Wang, Justin Zhan, Jun Zhang
GRC
2008
IEEE
13 years 4 months ago
A Computational Model on Harmonizing Chinese Folksong with Piano Accompaniment
Research on auto-harmonizing a melody (e.g. Chinese folksong) with piano accompaniment is trying to build up a computer system which generates a 3voice music including piano left-...
Yin Feng, Chang-Le Zhou
GRC
2008
IEEE
13 years 5 months ago
Adaptive and Iterative Least Squares Support Vector Regression based on Quadratic Renyi Entropy
An adaptive and iterative LSSVR algorithm based on quadratic Renyi entropy is presented in this paper. LS-SVM loses the sparseness of support vector which is one of the important ...
Jingqing Jiang, Chuyi Song, Haiyan Zhao, Chunguo W...
GRC
2008
IEEE
13 years 4 months ago
MovStream: An Efficient Algorithm for Monitoring Clusters Evolving in Data Streams
Monitoring cluster evolution in data streams is a major research topic in data streams mining. Previous clustering methods for evolving data streams focus on global clustering res...
Liang Tang, Chang-jie Tang, Lei Duan, Chuan Li, Ye...
GRC
2008
IEEE
13 years 5 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...