Sciweavers

359 search results - page 52 / 72
» A Clustering Approach for Achieving Data Privacy
Sort
View
DICTA
2003
13 years 8 months ago
Robust Estimation in Gaussian Mixtures Using Multiresolution Kd-trees
For many applied problems in the context of clustering via mixture models, the estimates of the component means and covariance matrices can be affected by observations that are at...
Shu-Kay Ng, Geoffrey J. McLachlan
COMCOM
2008
91views more  COMCOM 2008»
13 years 7 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
WWW
2011
ACM
13 years 2 months ago
Counting triangles and the curse of the last reducer
The clustering coefficient of a node in a social network is a fundamental measure that quantifies how tightly-knit the community is around the node. Its computation can be reduce...
Siddharth Suri, Sergei Vassilvitskii
ICIAP
2003
ACM
14 years 7 months ago
Automatic segmentation of MR images based on adaptive anisotropic filtering
A novel approach to the detection of multiple sclerosis (MS) lesions is presented, which uses an adaptive formulation of the anisotropic diffusion and fuzzy-c-means (FCM) clusteri...
Edoardo Ardizzone, Roberto Pirrone, Orazio Gambino
ICSOC
2010
Springer
13 years 5 months ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...