Sciweavers

221 search results - page 20 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
TVCG
2002
132views more  TVCG 2002»
13 years 7 months ago
Hierarchical Pixel Bar Charts
Simple presentation graphics are intuitive and easy-to-use, but only show highly aggregated data. Bar charts, for example, only show a rather small number of data values and x-y-pl...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal
COLING
2000
13 years 9 months ago
Language Identification In Unknown Signals
This paper describes algorithms and software developed to characterise and detect generic intelligent language-like features iu an input signal, using Natural Language Learning te...
John R. Elliott, Eric Atwell, Bill Whyte
KDD
2006
ACM
173views Data Mining» more  KDD 2006»
14 years 8 months ago
Robust information-theoretic clustering
How do we find a natural clustering of a real world point set, which contains an unknown number of clusters with different shapes, and which may be contaminated by noise? Most clu...
Christian Böhm, Christos Faloutsos, Claudia P...
MCS
2007
Springer
14 years 1 months ago
Stopping Criteria for Ensemble-Based Feature Selection
Selecting the optimal number of features in a classifier ensemble normally requires a validation set or cross-validation techniques. In this paper, feature ranking is combined with...
Terry Windeatt, Matthew Prior
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 8 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff