Sciweavers

909 search results - page 81 / 182
» Reversible data hiding
Sort
View
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 10 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
WCNC
2008
IEEE
14 years 4 months ago
On Spatial Reuse and Capture in Ad Hoc Networks
—Neighbors of both the transmitter and the receiver must keep quiet in a 802.11 wireless network as it requires bidirectional exchange, i.e., nodes reverse their roles as transmi...
Naveen Santhapuri, Srihari Nelakuditi, Romit Roy C...
INTERNET
2010
170views more  INTERNET 2010»
13 years 8 months ago
Developing RESTful Web Services with Webmachine
bstractions and mechanisms Webmachine supplies to RESTful Web services developers. Not Your Typical Framework Web services frameworks typically fall into one of the following broad...
Justin Sheehy, Steve Vinoski
SIGMOD
2003
ACM
1527views Database» more  SIGMOD 2003»
14 years 10 months ago
XPRESS: A Queriable Compression for XML Data
Like HTML, many XML documents are resident on native file systems. Since XML data is irregular and verbose, the disk space and the network bandwidth are wasted. To overcome the ve...
Jun-Ki Min, Myung-Jae Park, Chin-Wan Chung
ADC
2003
Springer
162views Database» more  ADC 2003»
14 years 3 months ago
Automated Data Warehousing for Rule-based CRM Systems
This paper proposes a novel way of automatically developing data warehouse configuration in rule-based CRM systems. Rule-based CRM systems assume that marketing activities are re...
Han-joon Kim, Taehee Lee, Sang-goo Lee, Jonghun Ch...