Sciweavers

2070 search results - page 359 / 414
» Regret-Minimizing Representative Databases
Sort
View
ESORICS
2009
Springer
14 years 4 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 4 months ago
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP)
Anomalous windows are the contiguous groupings of data points. In this paper, we propose an approach for discovering anomalous windows using Scan Statistics for Linear Intersectin...
Lei Shi, Vandana Pursnani Janeja
CIKM
2009
Springer
14 years 4 months ago
MKEM: a multi-level knowledge emergence model for mining undiscovered public knowledge
Background: Since Swanson proposed the Undiscovered Public Knowledge (UPK) model, there have been many approaches to uncover UPK by mining the biomedical literature. These earlier...
Ali Zeeshan Ijaz, Min Song, Doheon Lee
DEXA
2009
Springer
175views Database» more  DEXA 2009»
14 years 4 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
DEXA
2009
Springer
166views Database» more  DEXA 2009»
14 years 4 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...