Sciweavers

1997 search results - page 76 / 400
» A Model for Data Leakage Detection
Sort
View
ICMLA
2009
15 years 8 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
CSB
2005
IEEE
126views Bioinformatics» more  CSB 2005»
15 years 5 months ago
Discover True Association Rates in Multi-protein Complex Proteomics Data Sets
Experimental processes to collect and process proteomics data are increasingly complex, while the computational methods to assess the quality and significance of these data remain...
Changyu Shen, Lang Li, Jake Yue Chen
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 6 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
ECCV
2004
Springer
15 years 5 months ago
Hand Pose Estimation Using Hierarchical Detection
This paper presents an analysis of the design of classifiers for use in a hierarchical object recognition approach. In this approach, a cascade of classifiers is arranged in a tr...
Bjoern Stenger, Arasanathan Thayananthan, Philip H...
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
15 years 9 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal