Sciweavers

50 search results - page 4 / 10
» Utility of Knowledge Extracted from Unsanitized Data when Ap...
Sort
View
SIBGRAPI
2007
IEEE
14 years 1 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 1 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
ICPR
2008
IEEE
14 years 8 months ago
Fuzzy rule selection using Iterative Rule Learning for speech data classification
Fuzzy rule base systems have been successfully used for pattern classification. These systems focus on generating a rule-base from numerical input data. The resulting rule-base ca...
Bin Ma, Chng Eng Siong, Haizhou Li, Omid Dehzangi
JAIR
2010
160views more  JAIR 2010»
13 years 6 months ago
Constructing Reference Sets from Unstructured, Ungrammatical Text
Vast amounts of text on the Web are unstructured and ungrammatical, such as classified ads, auction listings, forum postings, etc. We call such text “posts.” Despite their in...
Matthew Michelson, Craig A. Knoblock
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok