Sciweavers

2464 search results - page 366 / 493
» Efficient learning equilibrium
Sort
View
KDD
2006
ACM
123views Data Mining» more  KDD 2006»
14 years 11 months ago
Mining rank-correlated sets of numerical attributes
We study the mining of interesting patterns in the presence of numerical attributes. Instead of the usual discretization methods, we propose the use of rank based measures to scor...
Toon Calders, Bart Goethals, Szymon Jaroszewicz
VLDB
2008
ACM
147views Database» more  VLDB 2008»
14 years 11 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
PERCOM
2008
ACM
14 years 10 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
ICCD
2005
IEEE
135views Hardware» more  ICCD 2005»
14 years 7 months ago
Extended Forward Implications and Dual Recurrence Relations to Identify Sequentially Untestable Faults
In this paper, we make two major contributions: First, to enhance Boolean learning, we propose a new class of logic implications called extended forward implications. Using a nove...
Manan Syal, Rajat Arora, Michael S. Hsiao
ICMCS
2008
IEEE
145views Multimedia» more  ICMCS 2008»
14 years 5 months ago
Video search reranking via online ordinal reranking
To exploit co-occurrence patterns among features and target semantics while keeping the simplicity of the keywordbased visual search, a novel reranking methods is proposed. The ap...
Yi-Hsuan Yang, Winston H. Hsu