Sciweavers

1512 search results - page 256 / 303
» Towards the Personalization of Algorithms Evaluation in Data...
Sort
View
CCS
2007
ACM
15 years 4 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
ICDE
2012
IEEE
246views Database» more  ICDE 2012»
13 years 6 days ago
HiCS: High Contrast Subspaces for Density-Based Outlier Ranking
—Outlier mining is a major task in data analysis. Outliers are objects that highly deviate from regular objects in their local neighborhood. Density-based outlier ranking methods...
Fabian Keller, Emmanuel Müller, Klemens B&oum...
AIRS
2010
Springer
14 years 7 months ago
Semantic Relation Extraction Based on Semi-supervised Learning
Many tasks of information extraction or natural language processing have a property that the data naturally consist of several views--disjoint subsets of features. Specifically, a ...
Haibo Li, Yutaka Matsuo, Mitsuru Ishizuka
KDD
1994
ACM
125views Data Mining» more  KDD 1994»
15 years 1 months ago
Knowledge Discovery in Large Image Databases: Dealing with Uncertainties in Ground Truth
This paper discusses the problem of knowledge discovery in image databases with particular focus on the issues which arise when absolute ground truth is not available. It is often...
Padhraic Smyth, Michael C. Burl, Usama M. Fayyad, ...
EJWCN
2010
119views more  EJWCN 2010»
14 years 4 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...