Sciweavers

7163 search results - page 1365 / 1433
» Privacy-Preserving Data Mining
Sort
View
FLAIRS
2006
13 years 11 months ago
Inexact Graph Matching: A Case of Study
Inexact graph matching has become an important research area because it is used to find similarities among objects in several real domains such as chemical and biological compound...
Ivan Olmos, Jesus A. Gonzalez, Mauricio Osorio
KDID
2004
127views Database» more  KDID 2004»
13 years 11 months ago
Implicit Enumeration of Patterns
Condensed representations of pattern collections have been recognized to be important building blocks of inductive databases, a promising theoretical framework for data mining, and...
Taneli Mielikäinen
USENIX
2001
13 years 11 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
SPIESR
2004
127views Database» more  SPIESR 2004»
13 years 11 months ago
New perspective on visual information retrieval
Visual information retrieval (VIR) is a research area with more than 300 scientific publications every year. Technological progress lets surveys become out of date within a short ...
Horst Eidenberger
SPLST
2003
13 years 11 months ago
Compacting XML Documents
Abstract. Nowadays one of the most common formats for storing information is XML. The size of XML documents can be rather large, and they may contain redundant attributes which can...
Miklós Kálmán, Ferenc Havasi,...
« Prev « First page 1365 / 1433 Last » Next »