Sciweavers

134 search results - page 15 / 27
» Experimental analysis of privacy loss in DCOP algorithms
Sort
View
86
Voted
ISI
2003
Springer
15 years 2 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
ACL
2003
14 years 11 months ago
Fast Methods for Kernel-Based Text Analysis
Kernel-based learning (e.g., Support Vector Machines) has been successfully applied to many hard problems in Natural Language Processing (NLP). In NLP, although feature combinatio...
Taku Kudo, Yuji Matsumoto
MM
2009
ACM
146views Multimedia» more  MM 2009»
15 years 4 months ago
Sports video retargeting
With the proliferation of diverse multimedia terminals, the request for elegantly retargeting videos to different display devices is evident, especially in sports. This demonstra...
Liang Shi, Jinqiao Wang, Lingyu Duan, Hanqing Lu
ICDAR
2011
IEEE
13 years 9 months ago
A Lattice-Based Method for Keyword Spotting in Online Chinese Handwriting
——This paper proposes a lattice-based method for keyword spotting in online Chinese handwriting to improve the trade-off between accuracy and speed, and to overcome the out-of-...
Heng Zhang, Cheng-Lin Liu
KDD
2008
ACM
134views Data Mining» more  KDD 2008»
15 years 10 months ago
Privacy-preserving cox regression for survival analysis
Privacy-preserving data mining (PPDM) is an emergent research area that addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper we prop...
Shipeng Yu, Glenn Fung, Rómer Rosales, Srir...