Sciweavers

2705 search results - page 218 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
128
Voted
CSFW
1998
IEEE
15 years 6 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
132
Voted
PODS
2008
ACM
159views Database» more  PODS 2008»
16 years 2 months ago
Approximation algorithms for clustering uncertain data
There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. This un...
Graham Cormode, Andrew McGregor
114
Voted
CVPR
2008
IEEE
16 years 4 months ago
A discriminatively trained, multiscale, deformable part model
This paper describes a discriminatively trained, multiscale, deformable part model for object detection. Our system achieves a two-fold improvement in average precision over the b...
Pedro F. Felzenszwalb, David A. McAllester, Deva R...
123
Voted
SEBD
2008
177views Database» more  SEBD 2008»
15 years 4 months ago
Using PageRank in Feature Selection
Abstract. Feature selection is an important task in data mining because it allows to reduce the data dimensionality and eliminates the noisy variables. Traditionally, feature selec...
Dino Ienco, Rosa Meo, Marco Botta
167
Voted
SDM
2012
SIAM
305views Data Mining» more  SDM 2012»
13 years 5 months ago
Learning Hierarchical Relationships among Partially Ordered Objects with Heterogeneous Attributes and Links
Objects linking with many other objects in an information network may imply various semantic relationships. Uncovering such knowledge is essential for role discovery, data cleanin...
Chi Wang, Jiawei Han, Qi Li, Xiang Li, Wen-Pin Lin...