Sciweavers

300 search results - page 37 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
ISI
2005
Springer
14 years 2 months ago
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. ...
Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balas...
WEBNET
1996
13 years 10 months ago
Digital Libraries Based on Full-Text Retrieval
: Because digital libraries are expensive to create and maintain, Internet analogs of public libraries--reliable, quality, community services--have only recently begun to appear. A...
Ian H. Witten, Craig G. Nevill-Manning, Sally Jo C...
ACSC
2010
IEEE
13 years 3 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
TDP
2010
140views more  TDP 2010»
13 years 3 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
ICIP
2006
IEEE
14 years 10 months ago
Precision-Oriented Active Selection for Interactive Image Retrieval
Active learning methods have been considered with an increased interest in the content-based image retrieval (CBIR) community. Those methods used to be based on classical classifi...
Philippe Henri Gosselin, Matthieu Cord