Sciweavers

8828 search results - page 1562 / 1766
» Formal methods in practice
Sort
View
PVLDB
2010
110views more  PVLDB 2010»
15 years 2 months ago
Behavior Based Record Linkage
In this paper, we present a new record linkage approach that uses entity behavior to decide if potentially different entities are in fact the same. An entity’s behavior is extra...
Mohamed Yakout, Ahmed K. Elmagarmid, Hazem Elmelee...
PVLDB
2010
179views more  PVLDB 2010»
15 years 2 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...
RAID
2010
Springer
15 years 2 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
SSPR
2010
Springer
15 years 2 months ago
Non-parametric Mixture Models for Clustering
Mixture models have been widely used for data clustering. However, commonly used mixture models are generally of a parametric form (e.g., mixture of Gaussian distributions or GMM),...
Pavan Kumar Mallapragada, Rong Jin, Anil K. Jain
TIFS
2010
127views more  TIFS 2010»
15 years 2 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
« Prev « First page 1562 / 1766 Last » Next »