Sciweavers

2705 search results - page 429 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
139
Voted
IMAGING
2004
15 years 4 months ago
Rendering Non-Pictorial (Scientific) High Dynamic Range Images
This research integrates the techniques used for the display of high dynamic range pictorial imagery for the practical visualization of non-pictorial (scientific) imagery such as ...
Sung-Ho Park, Ethan D. Montag
149
Voted
CSMR
2010
IEEE
14 years 9 months ago
Does the Past Say It All? Using History to Predict Change Sets in a CMDB
To avoid unnecessary maintenance costs in large IT systems resulting from poorly planned changes, it is essential to manage and control changes to the system and to verify that all...
Sarah Nadi, Richard C. Holt, Serge Mankovski
154
Voted
CCS
2006
ACM
15 years 6 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
116
Voted
ICML
2004
IEEE
16 years 3 months ago
Learning and evaluating classifiers under sample selection bias
Classifier learning methods commonly assume that the training data consist of randomly drawn examples from the same distribution as the test examples about which the learned model...
Bianca Zadrozny
160
Voted
KDD
2003
ACM
191views Data Mining» more  KDD 2003»
16 years 3 months ago
Assessment and pruning of hierarchical model based clustering
The goal of clustering is to identify distinct groups in a dataset. The basic idea of model-based clustering is to approximate the data density by a mixture model, typically a mix...
Jeremy Tantrum, Alejandro Murua, Werner Stuetzle