Sciweavers

185 search results - page 35 / 37
» Information Infrastructures for Distributed Collective Pract...
Sort
View
SAC
2006
ACM
14 years 1 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
11 years 10 months ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
SIGSOFT
2002
ACM
14 years 8 months ago
Improving program slicing with dynamic points-to data
Program slicing is a potentially useful analysis for aiding program understanding. However, slices of even small programs are often too large to be generally useful. Imprecise poi...
Markus Mock, Darren C. Atkinson, Craig Chambers, S...
JCDL
2006
ACM
147views Education» more  JCDL 2006»
14 years 1 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
ICDCS
2005
IEEE
14 years 1 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du