Sciweavers

2705 search results - page 478 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ALMOB
2007
129views more  ALMOB 2007»
15 years 2 months ago
Consistency of the Neighbor-Net Algorithm
Background: Neighbor-Net is a novel method for phylogenetic analysis that is currently being widely used in areas such as virology, bacteriology, and plant evolution. Given an inp...
David Bryant, Vincent Moulton, Andreas Spillner
207
Voted
SIGMOD
2008
ACM
236views Database» more  SIGMOD 2008»
16 years 2 months ago
Approximate embedding-based subsequence matching of time series
A method for approximate subsequence matching is introduced, that significantly improves the efficiency of subsequence matching in large time series data sets under the dynamic ti...
Vassilis Athitsos, Panagiotis Papapetrou, Michalis...
118
Voted
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 8 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
102
Voted
APSEC
2006
IEEE
15 years 8 months ago
Project Replayer with Email Analysis - Revealing Contexts in Software Development
In many software development projects, people tend to repeat same mistakes due to lack of shared knowledge from past experiences. Generally, it is very difficult to manually find ...
Kimiharu Okura, Keita Goto, Noriko Hanakawa, Shinj...
CIKM
2008
Springer
15 years 3 months ago
Learning a two-stage SVM/CRF sequence classifier
Learning a sequence classifier means learning to predict a sequence of output tags based on a set of input data items. For example, recognizing that a handwritten word is "ca...
Guilherme Hoefel, Charles Elkan