Sciweavers

61 search results - page 12 / 13
» Detecting Privacy and Ethical Sensitivity in Data Mining Res...
Sort
View
CCS
2010
ACM
15 years 1 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
CIKM
2010
Springer
14 years 8 months ago
SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks
Community detection is an important task for mining the structure and function of complex networks. Generally, there are several different kinds of nodes in a network which are c...
Jianbin Huang, Heli Sun, Jiawei Han, Hongbo Deng, ...
ESORICS
2009
Springer
15 years 4 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
DAWAK
2007
Springer
15 years 4 months ago
MOSAIC: A Proximity Graph Approach for Agglomerative Clustering
Representative-based clustering algorithms are quite popular due to their relative high speed and because of their sound theoretical foundation. On the other hand, the clusters the...
Jiyeon Choo, Rachsuda Jiamthapthaksin, Chun-Sheng ...
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
14 years 11 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen