Sciweavers

286 search results - page 36 / 58
» Fuzzy Sets and Rough Sets for Scenario Modelling and Analysi...
Sort
View
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
14 years 8 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
ENTCS
2006
173views more  ENTCS 2006»
13 years 7 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
NIPS
2004
13 years 9 months ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
JKM
2007
115views more  JKM 2007»
13 years 7 months ago
Rapid knowledge work visualization for organizations
Purpose: The purpose of this contribution is to motivate a new, rapid approach to modeling knowledge work in organizational settings and to introduce a software tool that demonstr...
Markus Strohmaier, Stefanie N. Lindstaedt
INFOCOM
2010
IEEE
13 years 6 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...