Sciweavers

1486 search results - page 162 / 298
» Firewall Rules Analysis
Sort
View
181
Voted
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
15 years 10 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
IRI
2006
IEEE
15 years 10 months ago
Similarity issues in attribute implications from data with fuzzy attributes
— We study similarity in formal concept analysis of data tables with fuzzy attributes. We focus on similarity related to attribute implications, i.e. rules A ⇒ B describing dep...
Radim Belohlávek, Vilém Vychodil
ACSC
2005
IEEE
15 years 10 months ago
A Simulation Framework for Knowledge Acquisition Evaluation
Knowledge acquisition (KA) plays an important role in building knowledge based systems (KBS). However, evaluating different KA techniques has been difficult because of the costs...
Tri M. Cao, Paul Compton
ICDAR
2005
IEEE
15 years 10 months ago
On-line Writer Adaptation for Handwriting Recognition using Fuzzy Inference Systems
We present an automatic on-line adaptation mechanism to the writer’s handwriting style for the recognition of isolated handwritten characters. The classifier is based on a Fuzz...
Harold Mouchère, Éric Anquetil, Nico...
ICDAR
2003
IEEE
15 years 9 months ago
Multi-Expert Verification of Hand-Written Signatures
This paper presents a multi-expert system for dynamic signature verification. The system uses a stroke-oriented description of signatures well-suited for multi-expert approach. Ea...
L. Bovino, Sebastiano Impedovo, Giuseppe Pirlo, L....