Sciweavers

4651 search results - page 269 / 931
» Data Reduction Using Multiple Models Integration
Sort
View
148
Voted
ECML
2004
Springer
15 years 8 months ago
SWITCH: A Novel Approach to Ensemble Learning for Heterogeneous Data
The standard framework of machine learning problems assumes that the available data is independent and identically distributed (i.i.d.). However, in some applications such as image...
Rong Jin, Huan Liu
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 9 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
100
Voted
CORR
2010
Springer
61views Education» more  CORR 2010»
15 years 3 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
214
Voted
VLDB
2007
ACM
102views Database» more  VLDB 2007»
16 years 3 months ago
Randomized Algorithms for Data Reconciliation in Wide Area Aggregate Query Processing
Many aspects of the data integration problem have been considered in the literature: how to match schemas across different data sources, how to decide when different records refer...
Fei Xu, Chris Jermaine
161
Voted
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 7 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok