Sciweavers

3451 search results - page 209 / 691
» Security of Backup Data
Sort
View
IJCNN
2006
IEEE
15 years 11 months ago
Data Fusion for Outlier Detection through Pseudo-ROC Curves and Rank Distributions
— This paper proposes a novel method of fusing models for classification of unbalanced data. The unbalanced data contains a majority of healthy (negative) instances, and a minor...
Paul F. Evangelista, Mark J. Embrechts, Boleslaw K...
MMSEC
2004
ACM
209views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Emir Ganic, Ahmet M. Eskicioglu
127
Voted
ESORICS
2004
Springer
15 years 10 months ago
Towards a Theory of Data Entanglement: (Extended Abstract)
d Abstract) James Aspnes , Joan Feigenbaum , Aleksandr Yampolskiy † , and Sheng Zhong ‡ Department of Computer Science, Yale University, New Haven CT 06520-8285, USA Abstract. ...
James Aspnes, Joan Feigenbaum, Aleksandr Yampolski...
CCS
2010
ACM
15 years 8 months ago
Towards publishing recommendation data with predictive anonymization
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
Chih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang...
ISI
2008
Springer
15 years 4 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava