Sciweavers

292 search results - page 26 / 59
» Exploiting Dead Value Information
Sort
View
SAC
2006
ACM
14 years 1 months ago
On the use of spectral filtering for privacy preserving data mining
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining.The previous work based on spectral filtering, show the noise ma...
Songtao Guo, Xintao Wu
FPL
2004
Springer
117views Hardware» more  FPL 2004»
14 years 27 days ago
Flow Monitoring in High-Speed Networks with 2D Hash Tables
Abstract. Flow monitoring is a required task for a variety of networking applications including fair scheduling and intrusion/anomaly detection. Existing flow monitoring techniques...
David Nguyen, Joseph Zambreno, Gokhan Memik
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 25 days ago
Identifying a Company's Non-Customer Online Communities: a Proto-typology
This paper describes an exploratory, qualitative study of a process for extracting, identifying and exploiting an enterprise's implicit (less visible) web communities using l...
Edna O. F. Reid
FATES
2004
Springer
13 years 11 months ago
Test Generation Based on Symbolic Specifications
Abstract. Classical state-oriented testing approaches are based on simple machine models such as Labelled Transition Systems (LTSs), in which data is represented by concrete values...
Lars Frantzen, Jan Tretmans, Tim A. C. Willemse
ISICT
2003
13 years 9 months ago
Tag semantics for the retrieval of XML documents
Word Sense Disambiguation (WSD), in the field of Natural Language Processing (NLP), consists in assigning the correct sense (semantics) to a word form (lexeme) by means of the cont...
Davide Buscaldi, Giovanna Guerrini, Marco Mesiti, ...