Sciweavers

1231 search results - page 152 / 247
» A Model Transformation Approach for Design Pattern Evolution...
Sort
View
TSMC
2011
228views more  TSMC 2011»
14 years 11 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
KDD
2010
ACM
326views Data Mining» more  KDD 2010»
15 years 2 months ago
Document clustering via dirichlet process mixture model with feature selection
One essential issue of document clustering is to estimate the appropriate number of clusters for a document collection to which documents should be partitioned. In this paper, we ...
Guan Yu, Ruizhang Huang, Zhaojun Wang
BIOSURVEILLANCE
2007
Springer
15 years 10 months ago
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Yanna Shen, Gregory F. Cooper
CHI
2003
ACM
16 years 4 months ago
The bull's-eye: a framework for web application user interface design guidelines
A multi-leveled framework for user interface design guidelines of Web applications is presented. User interface design guidelines tend to provide information that is either too ge...
Betsy Beier, Misha W. Vaughan
CASES
2006
ACM
15 years 8 months ago
Incremental elaboration for run-time reconfigurable hardware designs
We present a new technique for compiling run-time reconfigurable hardware designs. Run-time reconfigurable embedded systems can deliver promising benefits over implementations in ...
Arran Derbyshire, Tobias Becker, Wayne Luk