Sciweavers

2705 search results - page 470 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
PAMI
2010
164views more  PAMI 2010»
15 years 9 days ago
Large-Scale Discovery of Spatially Related Images
— We propose a randomized data mining method that finds clusters of spatially overlapping images. The core of the method relies on the min-Hash algorithm for fast detection of p...
Ondrej Chum, Jiri Matas
148
Voted
VC
2010
168views more  VC 2010»
14 years 8 months ago
From sentence to emotion: a real-time three-dimensional graphics metaphor of emotions extracted from text
This paper presents a novel concept: a graphical representation of human emotion extracted from text sentences. The major contributions of this paper are the following. First, we p...
Stéphane Gobron, Junghyun Ahn, Georgios Pal...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 5 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
122
Voted
KDD
2009
ACM
178views Data Mining» more  KDD 2009»
16 years 2 months ago
Constrained optimization for validation-guided conditional random field learning
Conditional random fields(CRFs) are a class of undirected graphical models which have been widely used for classifying and labeling sequence data. The training of CRFs is typicall...
Minmin Chen, Yixin Chen, Michael R. Brent, Aaron E...
136
Voted
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 5 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...