Sciweavers

1640 search results - page 158 / 328
» Deriving Private Information from Randomized Data
Sort
View
157
Voted
APAQS
2000
IEEE
15 years 8 months ago
Object-Based Data Flow Testing of Web Applications
Recently, the extraordinarygrowth in the World Wide Web has been sweeping through business and industry. Many companies have developed or integrated their mission-critical applica...
Chien-Hung Liu, David Chenho Kung, Pei Hsia, Chih-...
148
Voted
IICAI
2003
15 years 5 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
COSIT
2003
Springer
145views GIS» more  COSIT 2003»
15 years 9 months ago
Extracting Landmarks with Data Mining Methods
Abstract. The navigation task is a very demanding application for mobile users. The algorithms of present software solutions are based on the established methods of car navigation ...
Birgit Elias
IAAI
1993
15 years 5 months ago
Dodger, a Diagnostic Expert System for the Evaluation of Nondestructive Test Data
Identification and characterization of indications in eddy current (ET) signals can be highly subjective in nature, with varying diagnoses made by different analysts or by a singl...
Arthur J. Levy, Jane E. Oppenlander, David M. Brud...
KES
2010
Springer
15 years 2 months ago
W-kmeans: Clustering News Articles Using WordNet
 Document clustering is a powerful technique that has been widely used for organizing data into smaller and manageable information kernels. Several approaches have been proposed...
Christos Bouras, Vassilis Tsogkas