Sciweavers

3395 search results - page 556 / 679
» Learning to efficiently rank
Sort
View
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 4 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
ICCD
2005
IEEE
135views Hardware» more  ICCD 2005»
16 years 1 months ago
Extended Forward Implications and Dual Recurrence Relations to Identify Sequentially Untestable Faults
In this paper, we make two major contributions: First, to enhance Boolean learning, we propose a new class of logic implications called extended forward implications. Using a nove...
Manan Syal, Rajat Arora, Michael S. Hsiao
ICPR
2008
IEEE
15 years 10 months ago
Pre-extracting method for SVM classification based on the non-parametric K-NN rule
With the increase of the training set’s size, the efficiency of support vector machine (SVM) classifier will be confined. To solve such a problem, a novel preextracting method f...
Deqiang Han, Chongzhao Han, Yi Yang, Yu Liu, Wenta...
IEEEARES
2008
IEEE
15 years 10 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin