Sciweavers

796 search results - page 59 / 160
» Spoofing prevention method
Sort
View
ICML
2008
IEEE
14 years 10 months ago
Detecting statistical interactions with additive groves of trees
Discovering additive structure is an important step towards understanding a complex multi-dimensional function because it allows the function to be expressed as the sum of lower-d...
Daria Sorokina, Rich Caruana, Mirek Riedewald, Dan...
ICSE
2009
IEEE-ACM
14 years 10 months ago
Improving API documentation usability with knowledge pushing
The documentation of API functions typically conveys detailed specifications for the benefit of interested readers. In some cases, however, it also contains usage directives, such...
Uri Dekel, James D. Herbsleb
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
14 years 10 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton
ASUNAM
2009
IEEE
14 years 4 months ago
Prying Data out of a Social Network
—Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators. We examine the difficulty of collecting profile and ...
Joseph Bonneau, Jonathan Anderson, George Danezis
HICSS
2009
IEEE
96views Biometrics» more  HICSS 2009»
14 years 4 months ago
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines
Much recent work has focused on the process of auditing the results of elections. Little work has focused on auditing the e-voting systems currently in use. The facilities for doi...
Sean Peisert, Matt Bishop, Alec Yasinsac