Sciweavers

2705 search results - page 470 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
122
Voted
PAMI
2010
164views more  PAMI 2010»
15 years 28 days ago
Large-Scale Discovery of Spatially Related Images
— We propose a randomized data mining method that finds clusters of spatially overlapping images. The core of the method relies on the min-Hash algorithm for fast detection of p...
Ondrej Chum, Jiri Matas
153
Voted
VC
2010
168views more  VC 2010»
14 years 9 months ago
From sentence to emotion: a real-time three-dimensional graphics metaphor of emotions extracted from text
This paper presents a novel concept: a graphical representation of human emotion extracted from text sentences. The major contributions of this paper are the following. First, we p...
Stéphane Gobron, Junghyun Ahn, Georgios Pal...
156
Voted
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 6 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
KDD
2009
ACM
178views Data Mining» more  KDD 2009»
16 years 3 months ago
Constrained optimization for validation-guided conditional random field learning
Conditional random fields(CRFs) are a class of undirected graphical models which have been widely used for classifying and labeling sequence data. The training of CRFs is typicall...
Minmin Chen, Yixin Chen, Michael R. Brent, Aaron E...
KDD
2010
ACM
310views Data Mining» more  KDD 2010»
15 years 6 months ago
An integrated machine learning approach to stroke prediction
Stroke is the third leading cause of death and the principal cause of serious long-term disability in the United States. Accurate prediction of stroke is highly valuable for early...
Aditya Khosla, Yu Cao, Cliff Chiung-Yu Lin, Hsu-Ku...