Sciweavers

1406 search results - page 256 / 282
» Learning Pseudo-independent Models: Analytical and Experimen...
Sort
View
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
16 years 9 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
WWW
2009
ACM
15 years 10 months ago
Combining anchor text categorization and graph analysis for paid link detection
In order to artificially boost the rank of commercial pages in search engine results, search engine optimizers pay for links to these pages on other websites. Identifying paid lin...
Kirill Nikolaev, Ekaterina Zudina, Andrey Gorshkov
KDD
2004
ACM
106views Data Mining» more  KDD 2004»
15 years 10 months ago
Early detection of insider trading in option markets
"Inside information" comes in many forms: knowledge of a corporate takeover, a terrorist attack, unexpectedly poor earnings, the FDA's acceptance of a new drug, etc...
Steve Donoho
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 3 months ago
Automatic detection of interaction groups
This paper addresses the problem of detecting interaction groups in an intelligent environment. To understand human activity, we need to identify human actors and their interperso...
Oliver Brdiczka, Jérôme Maisonnasse, ...
ICRA
1999
IEEE
138views Robotics» more  ICRA 1999»
15 years 2 months ago
Efficient Topological Exploration
We consider the robot exploration of a planar graphlike world. The robot's goal is to build a complete map of its environment. The environment is modeled as an arbitrary undi...
Ioannis M. Rekleitis, Vida Dujmovic, Gregory Dudek