Sciweavers

832 search results - page 50 / 167
» Spatial Data Mining Implementation: Alternatives and Perform...
Sort
View
CSSE
2006
IEEE
15 years 4 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
KDD
2009
ACM
146views Data Mining» more  KDD 2009»
15 years 11 months ago
Mining in a mobile environment
Distributed PRocessing in Mobile Environments (DPRiME) is a framework for processing large data sets across an ad-hoc network. Developed to address the shortcomings of Google’s ...
Sean McRoskey, James Notwell, Nitesh V. Chawla, Ch...
184
Voted
KES
2005
Springer
15 years 9 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
ICASSP
2007
IEEE
15 years 10 months ago
Local Linear Discriminant Analysis (LLDA) for Inference of Multisubject FMRI Data
Large intersubject variability is a well-described feature of fMRI studies, making inter-group inference, of critical importance for biological interpretation, difficult. Therefor...
Martin J. McKeown, Junning Li, Xuemei Huang, Z. Ja...
ASPDAC
2005
ACM
106views Hardware» more  ASPDAC 2005»
15 years 6 months ago
Using loop invariants to fight soft errors in data caches
Ever scaling process technology makes embedded systems more vulnerable to soft errors than in the past. One of the generic methods used to fight soft errors is based on duplicati...
Sri Hari Krishna Narayanan, Seung Woo Son, Mahmut ...