Sciweavers

30 search results - page 2 / 6
» isi 2005
Sort
View
ISI
2005
Springer
13 years 10 months ago
Active Automation of the DITSCAP
Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deep...
ISI
2005
Springer
13 years 10 months ago
Template Based Semantic Similarity for Security Applications
Boanerges Aleman-Meza, Christian Halaschek-Wiener,...
BC
2005
63views more  BC 2005»
13 years 4 months ago
Detecting chaotic structures in noisy pulse trains based on interspike interval reconstruction
The nonlinear prediction method based on the interspike interval (ISI) reconstruction is applied to the ISI sequence of noisy pulse trains and the detection of the deterministic st...
Takashi Kanamaru, Masatoshi Sekine
ISI
2005
Springer
13 years 10 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
ISI
2005
Springer
13 years 10 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic