Sciweavers

5435 search results - page 1000 / 1087
» Informed Detection Revisited
Sort
View
SIGMOD
1999
ACM
183views Database» more  SIGMOD 1999»
15 years 8 months ago
OPTICS: Ordering Points To Identify the Clustering Structure
Cluster analysis is a primary method for database mining. It is either used as a stand-alone tool to get insight into the distribution of a data set, e.g. to focus further analysi...
Mihael Ankerst, Markus M. Breunig, Hans-Peter Krie...
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
15 years 8 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
SP
1989
IEEE
15 years 8 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
FBIT
2007
IEEE
15 years 8 months ago
Mapping Genetic Influences on Brain Shape Using Multi-Atlas Fluid Image Alignment
In this pilot study, we developed a set of computer vision based surface segmentation and statistical shape analysis algorithms to study genetic influences on brain structure in a...
Meena Mani, Yi-Yu Chou, Natasha Lepore, Agatha D. ...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
15 years 8 months ago
Online discovery and maintenance of time series motifs
The detection of repeated subsequences, time series motifs, is a problem which has been shown to have great utility for several higher-level data mining algorithms, including clas...
Abdullah Mueen, Eamonn J. Keogh
« Prev « First page 1000 / 1087 Last » Next »