Sciweavers

3651 search results - page 610 / 731
» Data Mining for Security Applications
Sort
View
COMPUTE
2011
ACM
14 years 2 months ago
Similarity analysis of legal judgments
In this paper, we have made an effort to propose approaches to find similar legal judgements by extending the popular techniques used in information retrieval and search engines...
Sushanta Kumar, P. Krishna Reddy, V. Balakista Red...
SIGCOMM
2009
ACM
15 years 5 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
CONEXT
2009
ACM
15 years 6 days ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
BIODATAMINING
2008
147views more  BIODATAMINING 2008»
14 years 11 months ago
Neural networks for genetic epidemiology: past, present, and future
During the past two decades, the field of human genetics has experienced an information explosion. The completion of the human genome project and the development of high throughpu...
Alison A. Motsinger-Reif, Marylyn D. Ritchie
152
Voted
WWW
2008
ACM
15 years 11 months ago
Facetnet: a framework for analyzing communities and their evolutions in dynamic networks
We discover communities from social network data, and analyze the community evolution. These communities are inherent characteristics of human interaction in online social network...
Yu-Ru Lin, Yun Chi, Shenghuo Zhu, Hari Sundaram, B...