Sciweavers

2990 search results - page 432 / 598
» Thresholding for Change Detection
Sort
View
ISCI
2008
104views more  ISCI 2008»
15 years 3 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
CIKM
2010
Springer
15 years 2 months ago
Context modeling for ranking and tagging bursty features in text streams
Bursty features in text streams are very useful in many text mining applications. Most existing studies detect bursty features based purely on term frequency changes without takin...
Wayne Xin Zhao, Jing Jiang, Jing He, Dongdong Shan...
INFORMS
2010
177views more  INFORMS 2010»
15 years 2 months ago
Binarized Support Vector Machines
The widely used Support Vector Machine (SVM) method has shown to yield very good results in Supervised Classification problems. Other methods such as Classification Trees have bec...
Emilio Carrizosa, Belen Martin-Barragan, Dolores R...
PAKDD
2010
ACM
193views Data Mining» more  PAKDD 2010»
15 years 2 months ago
As Time Goes by: Discovering Eras in Evolving Social Networks
Abstract. Within the large body of research in complex network analysis, an important topic is the temporal evolution of networks. Existing approaches aim at analyzing the evolutio...
Michele Berlingerio, Michele Coscia, Fosca Giannot...
USS
2010
15 years 2 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel