Sciweavers

2084 search results - page 378 / 417
» Knowledge Exploitation from the Web
Sort
View
TKDE
2008
122views more  TKDE 2008»
13 years 9 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
CIKM
2010
Springer
13 years 7 months ago
Collaborative Dual-PLSA: mining distinction and commonality across multiple domains for text classification
:  Collaborative Dual-PLSA: Mining Distinction and Commonality across Multiple Domains for Text Classification Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yuhong Xiong, Zhon...
Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yu...
ICDM
2010
IEEE
197views Data Mining» more  ICDM 2010»
13 years 7 months ago
D-LDA: A Topic Modeling Approach without Constraint Generation for Semi-defined Classification
: D-LDA: A Topic Modeling Approach without Constraint Generation for Semi-Defined Classification Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yuhong Xiong, Zhongzhi Shi HP Labo...
Fuzhen Zhuang, Ping Luo, Zhiyong Shen, Qing He, Yu...
ACCV
2010
Springer
13 years 4 months ago
Minimal Representations for Uncertainty and Estimation in Projective Spaces
Abstract. Estimation using homogeneous entities has to cope with obstacles such as singularities of covariance matrices and redundant parametrizations which do not allow an immedia...
Wolfgang Förstner
INFOCOM
2011
IEEE
13 years 26 days ago
To preempt or not: Tackling bid and time-based cheating in online spectrum auctions
—Online spectrum auctions offer ample flexibility for bidders to request and obtain spectrum on-the-fly. Such flexibility, however, opens up new vulnerabilities to bidder mani...
Lara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao ...