Sciweavers

7163 search results - page 1251 / 1433
» Privacy-Preserving Data Mining
Sort
View
PKDD
2007
Springer
131views Data Mining» more  PKDD 2007»
15 years 5 months ago
Expectation Propagation for Rating Players in Sports Competitions
Abstract. Rating players in sports competitions based on game results is one example of paired comparison data analysis. Since an exact Bayesian treatment is intractable, several t...
Adriana Birlutiu, Tom Heskes
93
Voted
SSD
2007
Springer
133views Database» more  SSD 2007»
15 years 5 months ago
Compression of Digital Road Networks
Abstract. In the consumer market, there has been an increasing interest in portable navigation systems in the last few years. These systems usually work on digital map databases st...
Jonghyun Suh, Sungwon Jung, Martin Pfeifle, Khoa T...
85
Voted
DASC
2006
IEEE
15 years 5 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
104
Voted
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 4 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 4 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
« Prev « First page 1251 / 1433 Last » Next »