Sciweavers

836 search results - page 147 / 168
» Machine learning: a review of classification and combining t...
Sort
View
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
ESANN
2004
13 years 9 months ago
A Modular Framework for Multi category feature selection in Digital mammography
Many existing researches utilized many different approaches for recognition in digital mammography using various ANN classifier-modeling techniques. Different types of feature extr...
Ranadhir Ghosh, Moumita Ghosh, John Yearwood
PKDD
2001
Springer
168views Data Mining» more  PKDD 2001»
14 years 7 days ago
Identification of ECG Arrhythmias Using Phase Space Reconstruction
Changes in the normal rhythmicity of a human heart may result in different cardiac arrhythmias, which may be immediately fatal or cause irreparable damage to the heart when sustain...
Felice M. Roberts, Richard J. Povinelli, Kristina ...
LREC
2010
189views Education» more  LREC 2010»
13 years 9 months ago
A Database of Narrative Schemas
This paper describes a new language resource of events and semantic roles that characterize real-world situations. Narrative schemas contain sets of related events (edit and publi...
Nathanael Chambers, Daniel Jurafsky
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 2 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...