Sciweavers

3651 search results - page 159 / 731
» Data Mining for Security Applications
Sort
View
ICDM
2006
IEEE
132views Data Mining» more  ICDM 2006»
15 years 11 months ago
Mining for Tree-Query Associations in a Graph
New applications of data mining, such as in biology, bioinformatics, or sociology, are faced with large datasets structured as graphs. We present an efficient algorithm for minin...
Eveline Hoekx, Jan Van den Bussche
ICMLA
2008
15 years 6 months ago
Graph-Based Multilevel Dimensionality Reduction with Applications to Eigenfaces and Latent Semantic Indexing
Dimension reduction techniques have been successfully applied to face recognition and text information retrieval. The process can be time-consuming when the data set is large. Thi...
Sophia Sakellaridi, Haw-ren Fang, Yousef Saad
WKDD
2008
CPS
97views Data Mining» more  WKDD 2008»
15 years 11 months ago
Knowledge Management in the Ubiquitous Software Development
The continuous technical advances have lead to the proliferation of very small and very cheap microprocessors, equipped with sensors and capacity of wireless communication. The in...
José Miguel Rubio León
KDD
2009
ACM
187views Data Mining» more  KDD 2009»
16 years 5 months ago
New ensemble methods for evolving data streams
Advanced analysis of data streams is quickly becoming a key area of data mining research as the number of applications demanding such processing increases. Online mining when such...
Albert Bifet, Bernhard Pfahringer, Geoffrey Holmes...
EUROCRYPT
2001
Springer
15 years 9 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe