Sciweavers

3073 search results - page 497 / 615
» Real World Verification
Sort
View
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
13 years 8 months ago
Discovering Temporal Features and Relations of Activity Patterns
An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
Ehsan Nazerfard, Parisa Rashidi, Diane J. Cook
ICICS
2010
Springer
13 years 8 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ICWSM
2010
13 years 8 months ago
Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment
Twitter is a microblogging website where users read and write millions of short messages on a variety of topics every day. This study uses the context of the German federal electi...
Andranik Tumasjan, Timm O. Sprenger, Philipp G. Sa...
INFOCOM
2010
IEEE
13 years 8 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
PAKDD
2010
ACM
173views Data Mining» more  PAKDD 2010»
13 years 8 months ago
Distributed Knowledge Discovery with Non Linear Dimensionality Reduction
Data mining tasks results are usually improved by reducing the dimensionality of data. This improvement however is achieved harder in the case that data lay on a non linear manifol...
Panagis Magdalinos, Michalis Vazirgiannis, Dialect...