Sciweavers

2705 search results - page 428 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
96
Voted
PCM
2004
Springer
91views Multimedia» more  PCM 2004»
15 years 8 months ago
A Rapid Scheme for Slow-Motion Replay Segment Detection
Abstract. Efficient data mining for digital video has become increasingly important in recent years. In this paper, we present a new scheme for automatic detection of slow-motion r...
Wei-Hong Chuang, Dun-Yu Hsiao, Soo-Chang Pei, Home...
DAS
2006
Springer
15 years 4 months ago
XCDF: A Canonical and Structured Document Format
Accessing the structured content of PDF document is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we first present different methods...
Jean-Luc Bloechle, Maurizio Rigamonti, Karim Hadja...
132
Voted
CCS
2008
ACM
15 years 4 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CEC
2009
IEEE
15 years 6 months ago
Using genetic programming to obtain implicit diversity
—When performing predictive data mining, the use of ensembles is known to increase prediction accuracy, compared to single models. To obtain this higher accuracy, ensembles shoul...
Ulf Johansson, Cecilia Sönströd, Tuve L&...
126
Voted
CORR
2011
Springer
144views Education» more  CORR 2011»
14 years 6 months ago
Rank Aggregation via Nuclear Norm Minimization
The process of rank aggregation is intimately intertwined with the structure of skew-symmetric matrices. We apply recent advances in the theory and algorithms of matrix completion...
David F. Gleich, Lek-Heng Lim