Sciweavers

1368 search results - page 213 / 274
» The Implicit Pipeline Method
Sort
View
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
14 years 5 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
PG
2007
IEEE
14 years 5 months ago
Explicit Control of Vector Field Based Shape Deformations
Vector Field Based Shape Deformations (VFSD) have been introduced as an efficient method to deform shapes in a volume-preserving foldover-free manner. However, mainly simple impl...
Wolfram von Funck, Holger Theisel, Hans-Peter Seid...
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 5 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
CEEMAS
2007
Springer
14 years 5 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CIKM
2007
Springer
14 years 5 months ago
The role of documents vs. queries in extracting class attributes from text
Challenging the implicit reliance on document collections, this paper discusses the pros and cons of using query logs rather than document collections, as self-contained sources o...
Marius Pasca, Benjamin Van Durme, Nikesh Garera