Sciweavers

5754 search results - page 898 / 1151
» Multi-class Model M
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 11 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
HICSS
2009
IEEE
176views Biometrics» more  HICSS 2009»
15 years 11 months ago
Adoption of Electronic Commerce Technologies by SMEs in Malaysia
Electronic commerce (EC) offers many benefits to organizations of any size including small to medium- sized enterprises (SMEs). At this stage, there is still a need for a better u...
Sherah Kurnia, Basil Alzougool, Mazen Ali, Saadat ...
IDTRUST
2009
ACM
15 years 11 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
SAC
2009
ACM
15 years 11 months ago
Capturing truthiness: mining truth tables in binary datasets
We introduce a new data mining problem: mining truth tables in binary datasets. Given a matrix of objects and the properties they satisfy, a truth table identifies a subset of pr...
Clifford Conley Owens III, T. M. Murali, Naren Ram...
SENSYS
2009
ACM
15 years 11 months ago
Explicit and precise rate control for wireless sensor networks
The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive inc...
Avinash Sridharan, Bhaskar Krishnamachari