Sciweavers

2705 search results - page 177 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
CCR
2006
76views more  CCR 2006»
13 years 10 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
FORTE
2009
13 years 8 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
ESWA
2002
93views more  ESWA 2002»
13 years 10 months ago
Image mining by content
Image mining presents special characteristics due to the richness of the data that an image can show. Effective evaluation of the results of image mining by content requires that ...
Aura Conci, Everest Mathias M. M. Castro
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 10 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
REST
2010
ACM
14 years 5 days ago
A formal definition of RESTful semantic web services
In this article a formal model applying REST architectural principles to the description of semantic web services is introduced, including the discussion of its syntax and operati...
Antonio Garrote Hernández, María N. ...