Sciweavers

2705 search results - page 229 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
102
Voted
SDM
2004
SIAM
162views Data Mining» more  SDM 2004»
15 years 4 months ago
Subspace Clustering of High Dimensional Data
Clustering suffers from the curse of dimensionality, and similarity functions that use all input features with equal relevance may not be effective. We introduce an algorithm that...
Carlotta Domeniconi, Dimitris Papadopoulos, Dimitr...
AUSDM
2008
Springer
271views Data Mining» more  AUSDM 2008»
15 years 4 months ago
Classification of Brain-Computer Interface Data
In this paper we investigate the classification of mental tasks based on electroencephalographic (EEG) data for Brain Computer Interfaces (BCI) in two scenarios: off line and on-l...
Omar AlZoubi, Irena Koprinska, Rafael A. Calvo
CVPR
2006
IEEE
16 years 4 months ago
Intelligent Collaborative Tracking by Mining Auxiliary Objects
Many tracking methods face a fundamental dilemma in practice: tracking has to be computationally efficient but verifying if or not the tracker is following the true target tends t...
Ming Yang, Ying Wu, Shihong Lao
145
Voted
ACL
2011
14 years 6 months ago
An Algorithm for Unsupervised Transliteration Mining with an Application to Word Alignment
We propose a language-independent method for the automatic extraction of transliteration pairs from parallel corpora. In contrast to previous work, our method uses no form of supe...
Hassan Sajjad, Alexander Fraser, Helmut Schmid
ACSAC
2002
IEEE
15 years 7 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh