Sciweavers

1779 search results - page 279 / 356
» A Formal Model of Data Privacy
Sort
View
155
Voted
CCS
2010
ACM
15 years 2 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
178
Voted
ICDE
2011
IEEE
224views Database» more  ICDE 2011»
14 years 7 months ago
SmartTrace: Finding similar trajectories in smartphone networks without disclosing the traces
—In this demonstration paper, we present a powerful distributed framework for finding similar trajectories in a smartphone network, without disclosing the traces of participatin...
Costandinos Costa, Christos Laoudias, Demetrios Ze...
121
Voted
CSDA
2007
108views more  CSDA 2007»
15 years 3 months ago
Diagnostics for functional regression via residual processes
We develop regression diagnostics for functional regression models which relate a functional response to predictor variables that can be multivariate vectors or random functions. ...
Jeng-Min Chiou, Hans-Georg Müller
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
15 years 2 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...
142
Voted
UAI
2008
15 years 5 months ago
CT-NOR: Representing and Reasoning About Events in Continuous Time
We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed...
Aleksandr Simma, Moisés Goldszmidt, John Ma...