Sciweavers

5344 search results - page 228 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICDM
2005
IEEE
146views Data Mining» more  ICDM 2005»
15 years 9 months ago
On the Stationarity of Multivariate Time Series for Correlation-Based Data Analysis
Multivariate time series (MTS) data sets are common in various multimedia, medical and financial application domains. These applications perform several data-analysis operations ...
Kiyoung Yang, Cyrus Shahabi
141
Voted
LISA
2007
15 years 6 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
126
Voted
ICPR
2008
IEEE
15 years 10 months ago
A new multiobjective simulated annealing based clustering technique using stability and symmetry
Most clustering algorithms operate by optimizing (either implicitly or explicitly) a single measure of cluster solution quality. Such methods may perform well on some data sets bu...
Sriparna Saha, Sanghamitra Bandyopadhyay
ICML
2004
IEEE
15 years 9 months ago
Redundant feature elimination for multi-class problems
We consider the problem of eliminating redundant Boolean features for a given data set, where a feature is redundant if it separates the classes less well than another feature or ...
Annalisa Appice, Michelangelo Ceci, Simon Rawles, ...
ICBA
2004
Springer
121views Biometrics» more  ICBA 2004»
15 years 9 months ago
Watch List Face Surveillance Using Transductive Inference
The open set recognition task, most challenging among the biometric tasks, operates under the assumption that not all the probes have mates in the gallery. It requires the availabi...
Fayin Li, Harry Wechsler