Sciweavers

1402 search results - page 220 / 281
» Detecting Change in Data Streams
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
MAMMO
2010
Springer
14 years 1 months ago
Combined Reconstruction and Registration of Digital Breast Tomosynthesis
Digital breast tomosynthesis (DBT) has the potential to enhance breast cancer detection by reducing the confounding effect of superimposed tissue associated with conventional mamm...
Guang Yang, John H. Hipwell, Matthew J. Clarkson, ...
ICSAP
2010
13 years 11 months ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...
SDM
2010
SIAM
226views Data Mining» more  SDM 2010»
13 years 10 months ago
Two-View Transductive Support Vector Machines
Obtaining high-quality and up-to-date labeled data can be difficult in many real-world machine learning applications, especially for Internet classification tasks like review spam...
Guangxia Li, Steven C. H. Hoi, Kuiyu Chang
JIDM
2010
145views more  JIDM 2010»
13 years 7 months ago
Mining Relevant and Extreme Patterns on Climate Time Series with CLIPSMiner
One of the most important challenges for the researchers in the 21st Century is related to global heating and climate change that can have as consequence the intensiļ¬cation of na...
Luciana A. S. Romani, Ana Maria Heuminski de &Aacu...