Sciweavers

723 search results - page 2 / 145
» Learning a Hidden Subgraph
Sort
View
KDD
2005
ACM
145views Data Mining» more  KDD 2005»
14 years 6 months ago
Using and Learning Semantics in Frequent Subgraph Mining
The search for frequent subgraphs is becoming increasingly important in many application areas including Web mining and bioinformatics. Any use of graph structures in mining, howev...
Bettina Berendt
UAI
2001
13 years 7 months ago
Learning the Dimensionality of Hidden Variables
A serious problem in learning probabilistic models is the presence of hidden variables. These variables are not observed, yet interact with several of the observed variables. Dete...
Gal Elidan, Nir Friedman
STAIRS
2008
175views Education» more  STAIRS 2008»
13 years 7 months ago
Learning Process Behavior with EDY: an Experimental Analysis
This paper presents an extensive evaluation, on artificial datasets, of EDY, an unsupervised algorithm for automatically synthesizing a Structured Hidden Markov Model (S-HMM) from ...
Ugo Galassi
WPES
2004
ACM
13 years 11 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
NDSS
2007
IEEE
14 years 16 days ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith