Sciweavers

7864 search results - page 1242 / 1573
» Clustering Genetic Algorithm
Sort
View
WWW
2009
ACM
16 years 5 months ago
Detecting image spam using local invariant features and pyramid match kernel
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, we extract local invariant features ...
Haiqiang Zuo, Weiming Hu, Ou Wu, Yunfei Chen, Guan...
OSDI
2008
ACM
16 years 5 months ago
Error Log Processing for Accurate Failure Prediction
Error logs are a fruitful source of information both for diagnosis as well as for proactive fault handling ? however elaborate data preparation is necessary to filter out valuable...
Felix Salfner, Steffen Tschirpke
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 5 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 5 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
119
Voted
ALT
2009
Springer
16 years 1 months ago
Learning Unknown Graphs
Motivated by a problem of targeted advertising in social networks, we introduce and study a new model of online learning on labeled graphs where the graph is initially unknown and...
Nicolò Cesa-Bianchi, Claudio Gentile, Fabio...
« Prev « First page 1242 / 1573 Last » Next »