Sciweavers

993 search results - page 60 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
SADFE
2005
IEEE
15 years 9 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
138
Voted
ISBI
2004
IEEE
16 years 4 months ago
Detection of Bronchovascular pairs on HRCT Lung Images Through Relational Learning
The identification of bronchovascular pairs on High Resolution Computer Tomography (HRCT) images provides valuable diagnostic information in patients with suspected airway disease...
Mithun Nagendra Prasad, Arcot Sowmya
109
Voted
CIDR
2007
79views Algorithms» more  CIDR 2007»
15 years 5 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
132
Voted
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
16 years 3 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
130
Voted
GECCO
2006
Springer
214views Optimization» more  GECCO 2006»
15 years 7 months ago
A new discrete particle swarm algorithm applied to attribute selection in a bioinformatics data set
Many data mining applications involve the task of building a model for predictive classification. The goal of such a model is to classify examples (records or data instances) into...
Elon S. Correa, Alex Alves Freitas, Colin G. Johns...