Sciweavers

2049 search results - page 367 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 10 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
150
Voted
MSR
2006
ACM
15 years 10 months ago
Fine grained indexing of software repositories to support impact analysis
Versioned and bug-tracked software systems provide a huge amount of historical data regarding source code changes and issues management. In this paper we deal with impact analysis...
Gerardo Canfora, Luigi Cerulo
MSWIM
2006
ACM
15 years 10 months ago
Analysis of soft handover measurements in 3G network
A neural network based clustering method for the analysis of soft handovers in 3G network is introduced. The method is highly visual and it could be utilized in explorative analys...
Kimmo Raivio
KES
2004
Springer
15 years 9 months ago
Chance Discovery with Emergence of Future Scenarios
A "chance" is an event or a situation significant for making a decision in a complex environment. Since we organized a session of Chance Discovery in KES 2000, the basic...
Yukio Ohsawa
AUSAI
2003
Springer
15 years 9 months ago
A Case Study in Feature Invention for Breast Cancer Diagnosis Using X-Ray Scatter Images
Abstract. X-ray mammography is the current clinical method for screening for breast cancer, and like any technique, has its limitations. Several groups have reported differences i...
Shane M. Butler, Geoffrey I. Webb, Rob A. Lewis