Sciweavers

2705 search results - page 467 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ICDE
2008
IEEE
203views Database» more  ICDE 2008»
16 years 3 months ago
Training Linear Discriminant Analysis in Linear Time
Linear Discriminant Analysis (LDA) has been a popular method for extracting features which preserve class separability. It has been widely used in many fields of information proces...
Deng Cai, Xiaofei He, Jiawei Han
117
Voted
ICIP
2003
IEEE
16 years 3 months ago
Evaluation strategies for automatic linguistic indexing of pictures
With the rapid technological advances in machine learning and data mining, it is now possible to train computers with hundreds of semantic concepts for the purpose of annotating i...
James Ze Wang, Jia Li, Sui Ching Lin
109
Voted
SPLST
2003
15 years 3 months ago
Compacting XML Documents
Abstract. Nowadays one of the most common formats for storing information is XML. The size of XML documents can be rather large, and they may contain redundant attributes which can...
Miklós Kálmán, Ferenc Havasi,...
143
Voted
AINA
2009
IEEE
15 years 8 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
107
Voted
DASC
2006
IEEE
15 years 8 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...