Sciweavers

10182 search results - page 1935 / 2037
» Case Studies
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 2 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
MOBIHOC
2009
ACM
16 years 2 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
16 years 1 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
KDD
2003
ACM
99views Data Mining» more  KDD 2003»
16 years 1 months ago
Fragments of order
High-dimensional collections of 0-1 data occur in many applications. The attributes in such data sets are typically considered to be unordered. However, in many cases there is a n...
Aristides Gionis, Teija Kujala, Heikki Mannila
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 1 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
« Prev « First page 1935 / 2037 Last » Next »