Sciweavers

956 search results - page 135 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
16 years 9 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
ELPUB
2006
ACM
15 years 3 months ago
Pushing the Quality Level in Networked News Business: Semantic-Based Content Retrieval and Composition in International News Pub
Electronic publishing exploits numerous possibilities to present or exchange information and to communicate via most current media like the Internet. By utilizing modern Web techn...
Markus W. Schranz
ICML
2009
IEEE
15 years 10 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
COMPSAC
1996
IEEE
15 years 2 months ago
Handling Multimedia Data for Mobile Computers
Mobile clients have unusual needs for sending and receiving multimedia data. The traditional client/server paradigm does not take into account variable network conditions; thus tr...
Charles E. Perkins
ICDM
2009
IEEE
97views Data Mining» more  ICDM 2009»
15 years 4 months ago
Hierarchical Probabilistic Segmentation of Discrete Events
—Segmentation, the task of splitting a long sequence of discrete symbols into chunks, can provide important information about the nature of the sequence that is understandable to...
Guy Shani, Christopher Meek, Asela Gunawardana