Sciweavers

2370 search results - page 228 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
ICCS
2005
Springer
15 years 9 months ago
Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining
Abstract. Data Mining is often required to be performed among a number of groups of sites, where the precondition is that no privacy of any site should be leaked out to other sites...
Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan
PAKDD
2005
ACM
100views Data Mining» more  PAKDD 2005»
15 years 9 months ago
Pushing Tougher Constraints in Frequent Pattern Mining
In this paper we extend the state-of-art of the constraints that can be pushed in a frequent pattern computation. We introduce a new class of tough constraints, namely Loose Anti-m...
Francesco Bonchi, Claudio Lucchese
133
Voted
PCM
2005
Springer
117views Multimedia» more  PCM 2005»
15 years 9 months ago
A Robust Text Segmentation Approach in Complex Background Based on Multiple Constraints
In this paper we propose a robust text segmentation method in complex background. The proposed method first utilizes the K-means algorithm to decompose a detected text block into ...
Libo Fu, Weiqiang Wang, Yaowen Zhan
SIGMETRICS
2004
ACM
15 years 9 months ago
Insensitive load balancing
A large variety of communication systems, including telephone and data networks, can be represented by so-called Whittle networks. The stationary distribution of these networks is...
Thomas Bonald, Matthieu Jonckheere, Alexandre Prou...
CCS
2004
ACM
15 years 9 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen