Sciweavers

3142 search results - page 601 / 629
» Applied ontology issues
Sort
View
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 11 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
AAAI
2004
13 years 11 months ago
Text Classification by Labeling Words
Traditionally, text classifiers are built from labeled training examples. Labeling is usually done manually by human experts (or the users), which is a labor intensive and time co...
Bing Liu, Xiaoli Li, Wee Sun Lee, Philip S. Yu
ACSW
2004
13 years 11 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic
ACSW
2006
13 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
DGO
2006
128views Education» more  DGO 2006»
13 years 11 months ago
Supporting humanitarian relief logistics operations through online geocollaborative knowledge management
Over the past two years, horrific disasters such as the Asian Tsunami, Hurricane Katrina, and the Pakistan Earthquake have demonstrated the critical need for effective technologic...
Brian M. Tomaszewski, Alan M. MacEachren, Scott Pe...