Sciweavers

7163 search results - page 1219 / 1433
» Privacy-Preserving Data Mining
Sort
View
90
Voted
ICPR
2010
IEEE
15 years 2 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
AAAI
2007
15 years 1 months ago
Clustering with Local and Global Regularization
Clustering is an old research topic in data mining and machine learning communities. Most of the traditional clustering methods can be categorized local or global ones. In this pa...
Fei Wang, Changshui Zhang, Tao Li
DAS
2006
Springer
15 years 1 months ago
XCDF: A Canonical and Structured Document Format
Accessing the structured content of PDF document is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we first present different methods...
Jean-Luc Bloechle, Maurizio Rigamonti, Karim Hadja...
DBISP2P
2008
Springer
124views Database» more  DBISP2P 2008»
15 years 25 days ago
Exploiting Distribution Skew for Scalable P2P Text Clustering
K-Means clustering is widely used in information retrieval and data mining. Distributed K-Means variants have already been proposed, but none of the past algorithms scales to large...
Odysseas Papapetrou, Wolf Siberski, Fabian Leitrit...
ESA
2008
Springer
130views Algorithms» more  ESA 2008»
15 years 24 days ago
Linear Time Planarity Testing and Embedding of Strongly Connected Cyclic Level Graphs
Abstract. A level graph is a directed acyclic graph with a level assignment for each node. Such graphs play a prominent role in graph drawing. They express strict dependencies and ...
Christian Bachmaier, Wolfgang Brunner
« Prev « First page 1219 / 1433 Last » Next »