Sciweavers

18209 search results - page 117 / 3642
» Some Remarks on the Paper
Sort
View
ICCS
2005
Springer
14 years 3 months ago
Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining
Abstract. Data Mining is often required to be performed among a number of groups of sites, where the precondition is that no privacy of any site should be leaked out to other sites...
Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan
NPAR
2004
ACM
14 years 3 months ago
Interactive rendering of suggestive contours with temporal coherence
Line drawings can convey shape using remarkably minimal visual content. Suggestive contours, which are lines drawn at certain types of view-dependent surface inflections, were pr...
Douglas DeCarlo, Adam Finkelstein, Szymon Rusinkie...
CINQ
2004
Springer
125views Database» more  CINQ 2004»
14 years 3 months ago
The Hows, Whys, and Whens of Constraints in Itemset and Rule Discovery
Many researchers in our community (this author included) regularly emphasize the role constraints play in improving performance of data-mining algorithms. This emphasis has led to ...
Roberto J. Bayardo
ESORICS
2004
Springer
14 years 3 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
ICA
2004
Springer
14 years 3 months ago
Improving GRNNs in CAD Systems
Different Computer Aided Diagnosis (CAD) systems have been recently developed to detect microcalcifications (MCs) in digitalized mammography, among other techniques, applying Gen...
Fulgencio S. Buendía Buendía, J. Mig...