Sciweavers

1599 search results - page 273 / 320
» Probabilistic Analysis of Anonymity
Sort
View
CIKM
2006
Springer
13 years 11 months ago
Topic evolution and social interactions: how authors effect research
We propose a method for discovering the dependency relationships between the topics of documents shared in social networks using the latent social interactions, attempting to answ...
Ding Zhou, Xiang Ji, Hongyuan Zha, C. Lee Giles
APWEB
2003
Springer
13 years 11 months ago
A Web User Profiling Approach
People display regularities in almost everything they do. This paper proposes characteristics of an idealized algorithm that would allow an automatic extraction of web user profil ...
Younes Hafri, Chabane Djeraba, Peter L. Stanchev, ...
RAID
2000
Springer
13 years 11 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
RECOMB
2000
Springer
13 years 11 months ago
Sequencing-by-hybridization at the information-theory bound: an optimal algorithm
In a recent paper (Preparata et al., 1999) we introduced a novel probing scheme for DNA sequencing by hybridization (SBH). The new gapped-probe scheme combines natural and univers...
Franco P. Preparata, Eli Upfal
ACCV
1995
Springer
13 years 11 months ago
An Integrated Model for Evaluating the Amount of Data Required for Reliable Recognition
—Many recognition procedures rely on the consistency of a subset of data features with a hypothesis as the sufficient evidence to the presence of the corresponding object. We ana...
Michael Lindenbaum