Sciweavers

273 search results - page 28 / 55
» Bayesian Communication under Rough Sets Information
Sort
View
WSDM
2012
ACM
262views Data Mining» more  WSDM 2012»
12 years 2 months ago
Effects of user similarity in social media
There are many settings in which users of a social media application provide evaluations of one another. In a variety of domains, mechanisms for evaluation allow one user to say w...
Ashton Anderson, Daniel P. Huttenlocher, Jon M. Kl...
BMCBI
2006
115views more  BMCBI 2006»
13 years 7 months ago
Detecting recombination in evolving nucleotide sequences
Background: Genetic recombination can produce heterogeneous phylogenetic histories within a set of homologous genes. These recombination events can be obscured by subsequent resid...
Cheong Xin Chan, Robert G. Beiko, Mark A. Ragan
CVPR
1998
IEEE
14 years 9 months ago
Using Adaptive Tracking to Classify and Monitor Activities in a Site
We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
IPAW
2010
13 years 5 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
JOC
2006
71views more  JOC 2006»
13 years 7 months ago
Private Computation: k-Connected versus 1-Connected Networks
We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by pr...
Markus Bläser, Andreas Jakoby, Maciej Liskiew...