Sciweavers

2355 search results - page 292 / 471
» Anonymizing Temporal Data
Sort
View
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 4 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
TIME
2009
IEEE
15 years 8 months ago
The AXML Artifact Model
—Towards a data-centric workflow approach, we introduce an artifact model to capture data and workflow management activities in distributed settings. The model is built on Acti...
Serge Abiteboul, Pierre Bourhis, Alban Galland, Bo...
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
15 years 7 months ago
Modelling of distortion caused by packet losses in video transport
Abstract— This paper analyzes transmission-error induced distortion in decoded video. A recursion model is derived that relates the distortion in successive P-frames. The model t...
Yao Wang, Zhenyu Wu, Jill M. Boyce, Xiaoan Lu
CSL
2009
Springer
15 years 6 months ago
Upper Bounds on Stream I/O Using Semantic Interpretations
This paper extends for the first time semantic interpretation tools to infinite data in order to ensure Input/Output upper bounds on first order Haskell like programs on streams...
Marco Gaboardi, Romain Péchoux
DIMVA
2008
15 years 3 months ago
Traffic Aggregation for Malware Detection
Abstract. Stealthy malware, such as botnets and spyware, are hard to detect because their activities are subtle and do not disrupt the network, in contrast to DoS attacks and aggre...
Ting-Fang Yen, Michael K. Reiter