Sciweavers

221 search results - page 12 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
CICLING
2007
Springer
14 years 1 months ago
Unsupervised Discrimination of Person Names in Web Contexts
Ambiguous person names are a problem in many forms of written text, including that which is found on the Web. In this paper we explore the use of unsupervised clustering techniques...
Ted Pedersen, Anagha Kulkarni
SAC
2008
ACM
13 years 7 months ago
Efficient concept clustering for ontology learning using an event life cycle on the web
Ontology learning integrates many complementary techniques, including machine learning, natural language processing, and data mining. Specifically, clustering techniques facilitat...
Sangsoo Sung, Seokkyung Chung, Dennis McLeod
COMSUR
2007
101views more  COMSUR 2007»
13 years 7 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
EAAI
2007
99views more  EAAI 2007»
13 years 7 months ago
Data mining for agent reasoning: A synergy for training intelligent agents
The task-oriented nature of data mining (DM) has already been dealt successfully with the employment of intelligent agent systems that distribute tasks, collaborate and synchroniz...
Andreas L. Symeonidis, Kyriakos C. Chatzidimitriou...
CORR
2006
Springer
127views Education» more  CORR 2006»
13 years 7 months ago
Approximating Rate-Distortion Graphs of Individual Data: Experiments in Lossy Compression and Denoising
Classical rate-distortion theory requires knowledge of an elusive source distribution. Instead, we analyze rate-distortion properties of individual objects using the recently devel...
Steven de Rooij, Paul M. B. Vitányi