Sciweavers

280 search results - page 45 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
PODS
2003
ACM
156views Database» more  PODS 2003»
14 years 7 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
WWW
2003
ACM
14 years 8 months ago
Agent-based semantic web services
The Web Services world consists of loosely-coupled distributed systems which adapt to ad-hoc changes by the use of service descriptions that enable opportunistic service discovery...
Nicholas Gibbins, Stephen Harris, Nigel Shadbolt
CSDA
2007
151views more  CSDA 2007»
13 years 7 months ago
Robust semiparametric mixing for detecting differentially expressed genes in microarray experiments
An important goal of microarray studies is the detection of genes that show significant changes in observed expressions when two or more classes of biological samples such as tre...
Marco Alfò, Alessio Farcomeni, Luca Tardell...
JSAC
2007
105views more  JSAC 2007»
13 years 7 months ago
What and how much to gain by spectrum agility?
— Static spectrum allocation prohibits radio devices from using spectral bands designated for others. As a result, some bands are under-utilized while other bands are over-popula...
Chun-Ting Chou, Sai Shankar N., Hyoil Kim, Kang G....
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 8 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher