Sciweavers

1640 search results - page 60 / 328
» Deriving Private Information from Randomized Data
Sort
View
HOTOS
2003
IEEE
15 years 3 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
CSDA
2010
124views more  CSDA 2010»
14 years 10 months ago
Statistical inference on attributed random graphs: Fusion of graph features and content
Abstract: Fusion of information from graph features and content can provide superior inference for an anomaly detection task, compared to the corresponding content-only or graph fe...
John Grothendieck, Carey E. Priebe, Allen L. Gorin
EP
1998
Springer
15 years 2 months ago
Generating, Visualizing, and Evaluating High-Quality Clusters for Information Organization
We present and analyze the star clustering algorithm. We discuss an implementation of this algorithm that supports browsing and document retrieval through information organization...
Javed A. Aslam, Katya Pelekhov, Daniela Rus
BMCBI
2004
150views more  BMCBI 2004»
14 years 9 months ago
Rank Difference Analysis of Microarrays (RDAM), a novel approach to statistical analysis of microarray expression profiling data
Background: A key step in the analysis of microarray expression profiling data is the identification of genes that display statistically significant changes in expression signals ...
Dietmar E. Martin, Philippe Demougin, Michael N. H...
SIGIR
2012
ACM
13 years 8 days ago
TwiNER: named entity recognition in targeted twitter stream
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
Chenliang Li, Jianshu Weng, Qi He, Yuxia Yao, Anwi...