Sciweavers

139 search results - page 10 / 28
» Recovering Data Models via Guarded Dependences
Sort
View
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
IWCM
2004
Springer
14 years 28 days ago
Optimal Filters for Extended Optical Flow
Estimation of optical flow and physically motivated brightness changes can be formulated as parameter estimation in linear models. Accuracy of this estimation heavily depends on t...
Hanno Scharr
RAID
2009
Springer
14 years 2 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
JETAI
1998
110views more  JETAI 1998»
13 years 7 months ago
Independency relationships and learning algorithms for singly connected networks
Graphical structures such as Bayesian networks or Markov networks are very useful tools for representing irrelevance or independency relationships, and they may be used to e cientl...
Luis M. de Campos
RECOMB
2000
Springer
13 years 11 months ago
Using Bayesian networks to analyze expression data
DNA hybridization arrays simultaneously measure the expression level for thousands of genes. These measurements provide a "snapshot" of transcription levels within the c...
Nir Friedman, Michal Linial, Iftach Nachman, Dana ...