Sciweavers

134 search results - page 13 / 27
» Experimental analysis of privacy loss in DCOP algorithms
Sort
View
83
Voted
KBS
2006
127views more  KBS 2006»
14 years 9 months ago
Collaborative Recommending using Formal Concept Analysis
We show how Formal Concept Analysis (FCA) can be applied to Collaborative Recommenders. FCA is a mathematical method for analysing binary relations. Here we apply it to the relati...
Patrick du Boucher-Ryan, Derek G. Bridge
JNCA
2011
123views more  JNCA 2011»
14 years 4 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
93
Voted
IEEEARES
2010
IEEE
15 years 2 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
ICML
2005
IEEE
15 years 10 months ago
Active learning for sampling in time-series experiments with application to gene expression analysis
Many time-series experiments seek to estimate some signal as a continuous function of time. In this paper, we address the sampling problem for such experiments: determining which ...
Rohit Singh, Nathan Palmer, David K. Gifford, Bonn...
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
14 years 11 months ago
Dimension augmentation and combinatorial criteria for efficient error-resistant DNA self-assembly
DNA self-assembly has emerged as a rich and promising primitive for nano-technology. Experimental and analytical evidence indicates that such systems are prone to errors, and acco...
Ho-Lin Chen, Ashish Goel, Chris Luhrs