Sciweavers

2705 search results - page 489 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
100
Voted
ARTMED
1999
92views more  ARTMED 1999»
15 years 1 months ago
Two-Stage Machine Learning model for guideline development
We present a Two-Stage Machine Learning (ML) model as a data mining method to develop practice guidelines and apply it to the problem of dementia staging. Dementia staging in clin...
Subramani Mani, William Rodman Shankle, Malcolm B....
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
BMCBI
2010
172views more  BMCBI 2010»
15 years 1 months ago
Comparison of evolutionary algorithms in gene regulatory network model inference
Background: The evolution of high throughput technologies that measure gene expression levels has created a data base for inferring GRNs (a process also known as reverse engineeri...
Alina Sîrbu, Heather J. Ruskin, Martin Crane
CVPR
2000
IEEE
16 years 3 months ago
Representation and Optimal Recognition of Human Activities
Towards the goal of realizing a generic automatichuman activity recognition system, a new formalism is proposed. Activities are described by a chained hierarchical representation ...
François Brémond, Ramakant Nevatia, ...
TKDE
2012
208views Formal Methods» more  TKDE 2012»
13 years 4 months ago
A Knowledge-Driven Approach to Activity Recognition in Smart Homes
Abstract—This paper introduces a knowledge-driven approach to real-time, continuous activity recognition based on multisensor data streams in smart homes. The approach goes beyon...
Liming Chen, Chris D. Nugent, Hui Wang