Sciweavers

2705 search results - page 134 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
IWPC
2002
IEEE
14 years 3 months ago
Mining System-User Interaction Traces for Use Case Models
While code understanding is the primary program comprehension activity, it is quite challenging to recognize the application requirements from code, since they have usually been o...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
ICCV
2009
IEEE
15 years 3 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
PKDD
2010
Springer
235views Data Mining» more  PKDD 2010»
13 years 8 months ago
Online Structural Graph Clustering Using Frequent Subgraph Mining
The goal of graph clustering is to partition objects in a graph database into different clusters based on various criteria such as vertex connectivity, neighborhood similarity or t...
Madeleine Seeland, Tobias Girschick, Fabian Buchwa...
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
14 years 3 months ago
Feature Selection for High Dimensional Face Image Using Self-organizing Maps
: While feature selection is very difficult for high dimensional, unstructured data such as face image, it may be much easier to do if the data can be faithfully transformed into l...
Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Fuyan Zh...
FORMATS
2008
Springer
13 years 11 months ago
Formal Modeling and Scheduling of Datapaths of Digital Document Printers
Abstract. We apply three different modeling frameworks -- timed automata (Uppaal), colored Petri nets and synchronous data flow -- to model a challenging industrial case study that...
Georgeta Igna, Venkatesh Kannan, Yang Yang, Twan B...