Sciweavers

438 search results - page 16 / 88
» The forest hiding problem
Sort
View
ICDM
2008
IEEE
146views Data Mining» more  ICDM 2008»
15 years 6 months ago
Isolation Forest
Most existing model-based approaches to anomaly detection construct a profile of normal instances, then identify instances that do not conform to the normal profile as anomalies...
Fei Tony Liu, Kai Ming Ting, Zhi-Hua Zhou
IH
1999
Springer
15 years 4 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
AEI
2007
91views more  AEI 2007»
14 years 12 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
AMC
2004
79views more  AMC 2004»
14 years 11 months ago
Computational experience with exterior point algorithms for the transportation problem
An experimental computational study to compare the classical primal simplex algorithm and the exterior point algorithms for the transportation problem (TP) is presented. Totally, ...
Charalampos Papamanthou, Konstantinos Paparrizos, ...
ICIP
2003
IEEE
16 years 1 months ago
Error concealment of video sequences by data hiding
A complete error resilient video transmission codec is presented, utilizing imperceptible embedded information for combined detecting, resynchronization and reconstruction of the ...
Alper Yilmaz, A. Aydin Alatan