Sciweavers

1995 search results - page 71 / 399
» What's the Problem
Sort
View
107
Voted
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
16 years 4 months ago
Mining unexpected rules by pushing user dynamics
Unexpected rules are interesting because they are either previously unknown or deviate from what prior user knowledge would suggest. In this paper, we study three important issues...
Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan
120
Voted
HICSS
2007
IEEE
115views Biometrics» more  HICSS 2007»
15 years 10 months ago
Leveraging and Limiting Practical Drift in Emergency Response Planning
A knowledge gap exists between what emergency responders know from their direct experience and what emergency planners know from analysis and reflection. The theory of practical d...
Steven R. Haynes, Wendy A. Schafer, John M. Carrol...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 10 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
123
Voted
BROADNETS
2006
IEEE
15 years 9 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
121
Voted
ICDM
2005
IEEE
157views Data Mining» more  ICDM 2005»
15 years 9 months ago
Blocking Anonymity Threats Raised by Frequent Itemset Mining
In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty o...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...