Sciweavers

5740 search results - page 1142 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
ICDE
2008
IEEE
120views Database» more  ICDE 2008»
14 years 8 months ago
Direct Discriminative Pattern Mining for Effective Classification
The application of frequent patterns in classification has demonstrated its power in recent studies. It often adopts a two-step approach: frequent pattern (or classification rule) ...
Hong Cheng, Xifeng Yan, Jiawei Han, Philip S. Yu
WWW
2005
ACM
14 years 8 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu
WWW
2004
ACM
14 years 8 months ago
Visual web mining
Analysis of web site usage data involves two significant challenges: firstly the volume of data, arising from the growth of the web, and secondly, the structural complexity of web...
Amir H. Youssefi, David J. Duke, Mohammed Javeed Z...
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 8 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
14 years 8 months ago
Learning subspace kernels for classification
Kernel methods have been applied successfully in many data mining tasks. Subspace kernel learning was recently proposed to discover an effective low-dimensional subspace of a kern...
Jianhui Chen, Shuiwang Ji, Betul Ceran, Qi Li, Min...
« Prev « First page 1142 / 1148 Last » Next »