Sciweavers

1486 search results - page 185 / 298
» Firewall Rules Analysis
Sort
View
PERCOM
2008
ACM
16 years 3 months ago
Automatic form filling on mobile devices
Filling out forms of web based services on mobile devices is a very time consuming and frustrating task for users because of the limited text input capabilities. This is a critica...
Enrico Rukzio, Chie Noda, Alexander De Luca, John ...
ASUNAM
2009
IEEE
15 years 11 months ago
Modeling a Store's Product Space as a Social Network
A market basket is a set of products that form a single retail transaction. This purchase data of products can shed important light on how product(s) might influence sales of oth...
Troy Raeder, Nitesh V. Chawla
ICASSP
2009
IEEE
15 years 11 months ago
Speech reinforcement based on partial masking effect
Perceived quality of the speech signal deteriorates significantly in the presence of ambient noise. In this paper, based on the analysis that the partial masking effect is a main...
Jong Won Shin, Yu Gwang Jin, Seung Seop Park, Nam ...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 11 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
15 years 10 months ago
Sparse Kernel SVMs via Cutting-Plane Training
We explore an algorithm for training SVMs with Kernels that can represent the learned rule using arbitrary basis vectors, not just the support vectors (SVs) from the training set. ...
Thorsten Joachims, Chun-Nam John Yu