Sciweavers

237 search results - page 19 / 48
» On information hiding with incomplete information about steg...
Sort
View
INFOCOM
2012
IEEE
13 years 5 days ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
DAWAK
2003
Springer
15 years 3 months ago
Comprehensive Log Compression with Frequent Patterns
In this paper we present a comprehensive log compression (CLC) method that uses frequent patterns and their condensed representations to identify repetitive information from large ...
Kimmo Hätönen, Jean-François Boul...
PERVASIVE
2006
Springer
14 years 9 months ago
Building Reliable Activity Models Using Hierarchical Shrinkage and Mined Ontology
Abstract. Activity inference based on object use has received considerable recent attention. Such inference requires statistical models that map activities to the objects used in p...
Emmanuel Munguia Tapia, Tanzeem Choudhury, Matthai...
IJCNN
2006
IEEE
15 years 3 months ago
Predictive Random Graph Ranking on the Web
Abstract— The incomplete information about the Web structure causes inaccurate results of various ranking algorithms. In this paper, we propose a solution to this problem by form...
Haixuan Yang, Irwin King, Michael R. Lyu
OOPSLA
2007
Springer
15 years 3 months ago
Towards a framework for requirement change management in healthcare software applications
Requirements volatility is an issue in software development life cycle which often originated from our incomplete knowledge about the domain of interest. In this paper, we propose...
Arash Shaban-Nejad, Volker Haarslev