Sciweavers

6318 search results - page 68 / 1264
» Data Leakage Detection
Sort
View
ICRA
2009
IEEE
160views Robotics» more  ICRA 2009»
15 years 6 months ago
Appearance-based loop detection from 3D laser data using the normal distributions transform
— We propose a new approach to appearance based loop detection from metric 3D maps, exploiting the NDT surface representation. Locations are described with feature histograms bas...
Martin Magnusson 0002, Henrik Andreasson, Andreas ...
ACL
2003
15 years 1 months ago
Automatic Error Detection in the Japanese Learners' English Spoken Data
This paper describes a method of detecting grammatical and lexical errors made by Japanese learners of English and other techniques that improve the accuracy of error detection wi...
Emi Izumi, Kiyotaka Uchimoto, Toyomi Saiga, Thepch...
EDBT
2009
ACM
166views Database» more  EDBT 2009»
15 years 4 months ago
Neighbor-based pattern detection for windows over streaming data
The discovery of complex patterns such as clusters, outliers, and associations from huge volumes of streaming data has been recognized as critical for many domains. However, patte...
Di Yang, Elke A. Rundensteiner, Matthew O. Ward
TSMC
2011
228views more  TSMC 2011»
14 years 6 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
RAID
2000
Springer
15 years 3 months ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
Joachim Biskup, Ulrich Flegel