Sciweavers

3651 search results - page 660 / 731
» Data Mining for Security Applications
Sort
View
HUC
2011
Springer
12 years 9 months ago
iBAT: detecting anomalous taxi trajectories from GPS traces
GPS-equipped taxis can be viewed as pervasive sensors and the large-scale digital traces produced allow us to reveal many hidden “facts” about the city dynamics and human beha...
Daqing Zhang, Nan Li, Zhi-Hua Zhou, Chao Chen, Lin...
JBI
2010
212views Bioinformatics» more  JBI 2010»
13 years 4 months ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 10 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
SDM
2009
SIAM
394views Data Mining» more  SDM 2009»
14 years 7 months ago
Multi-Modal Hierarchical Dirichlet Process Model for Predicting Image Annotation and Image-Object Label Correspondence.
Many real-world applications call for learning predictive relationships from multi-modal data. In particular, in multi-media and web applications, given a dataset of images and th...
Oksana Yakhnenko, Vasant Honavar
SENSYS
2005
ACM
14 years 3 months ago
TSAR: a two tier sensor storage architecture using interval skip graphs
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems a...
Peter Desnoyers, Deepak Ganesan, Prashant J. Sheno...