Sciweavers

3651 search results - page 50 / 731
» Data Mining for Security Applications
Sort
View
90
Voted
IH
2005
Springer
15 years 6 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
89
Voted
SDM
2003
SIAM
148views Data Mining» more  SDM 2003»
15 years 1 months ago
ATLaS: A Native Extension of SQL for Data Mining
A lack of power and extensibility in their query languages has seriously limited the generality of DBMSs and hampered their ability to support data mining applications. Thus, ther...
Haixun Wang, Carlo Zaniolo
105
Voted
ICALP
2005
Springer
15 years 6 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
124
Voted
KES
2008
Springer
14 years 11 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
15 years 5 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee