Sciweavers

3272 search results - page 514 / 655
» Privacy in Data Publishing
Sort
View
DATAMINE
1999
108views more  DATAMINE 1999»
13 years 9 months ago
A Survey of Methods for Scaling Up Inductive Algorithms
Abstract. One of the de ning challenges for the KDD research community is to enable inductive learning algorithms to mine very large databases. This paper summarizes, categorizes, ...
Foster J. Provost, Venkateswarlu Kolluri
JHSN
1998
66views more  JHSN 1998»
13 years 9 months ago
A case for dynamic sender-based reservations in the Internet
In this paper we discuss the need for resource reservation in the Internet and examine some of the strengths and weaknesses of RSVP, which is currently the most popular of Interne...
Paul Patrick White, Jon Crowcroft
NN
2002
Springer
108views Neural Networks» more  NN 2002»
13 years 9 months ago
Dopamine: generalization and bonuses
In the temporal difference model of primate dopamine neurons, their phasic activity reports a prediction error for future reward. This model is supported by a wealth of experiment...
Sham Kakade, Peter Dayan
TOCS
2002
70views more  TOCS 2002»
13 years 9 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
PR
2007
85views more  PR 2007»
13 years 9 months ago
Grey-level hit-or-miss transforms - part II: Application to angiographic image processing
The hit-or-miss transform (HMT) is a fundamental operation on binary images, widely used since 40 years. As it is not increasing, its extension to grey-level images is not straigh...
Benoît Naegel, Nicolas Passat, Christian Ron...