Sciweavers

743 search results - page 96 / 149
» Performance Measurements for Privacy Preserving Data Mining
Sort
View
STORAGESS
2006
ACM
15 years 10 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 5 months ago
A probabilistic framework for semi-supervised clustering
Unsupervised clustering can be significantly improved using supervision in the form of pairwise constraints, i.e., pairs of instances labeled as belonging to same or different clu...
Sugato Basu, Mikhail Bilenko, Raymond J. Mooney
CIKM
2005
Springer
15 years 10 months ago
Mining officially unrecognized side effects of drugs by combining web search and machine learning
We consider the problem of finding officially unrecognized side effects of drugs. By submitting queries to the Web involving a given drug name, it is possible to retrieve pages co...
Carlo Curino, Yuanyuan Jia, Bruce Lambert, Patrici...
BMCBI
2006
169views more  BMCBI 2006»
15 years 4 months ago
Finding biological process modifications in cancer tissues by mining gene expression correlations
Background: Through the use of DNA microarrays it is now possible to obtain quantitative measurements of the expression of thousands of genes from a biological sample. This techno...
Giacomo Gamberoni, Sergio Storari, Stefano Volinia
ACSAC
2009
IEEE
15 years 11 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...