Sciweavers

3370 search results - page 193 / 674
» Correlation Embedding Analysis
Sort
View
232
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 3 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
142
Voted
ESORICS
2004
Springer
15 years 9 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
141
Voted
CIVR
2010
Springer
227views Image Analysis» more  CIVR 2010»
15 years 1 months ago
Evaluating detection of near duplicate video segments
The automatic detection of near duplicate video segments, such as multiple takes of a scene or different news video clips showing the same event, has received growing research int...
Werner Bailer
132
Voted
WWW
2009
ACM
16 years 4 months ago
Searching for events in the blogosphere
Over the last few years, blogs (web logs) have gained massive popularity and have become one of the most influential web social media in our times. Every blog post in the Blogosph...
Manolis Platakis, Dimitrios Kotsakos, Dimitrios Gu...
ASPDAC
2006
ACM
121views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Efficient early stage resonance estimation techniques for C4 package
- In this paper, we study the relationship between C4 package resonance effects and logical switching timing correlations, which has not been thoroughly investigated in the past. W...
Jin Shi, Yici Cai, Sheldon X.-D. Tan, Xianlong Hon...