Sciweavers

114 search results - page 19 / 23
» When do data mining results violate privacy
Sort
View
SIGKDD
2010
128views more  SIGKDD 2010»
13 years 2 months ago
On cross-validation and stacking: building seemingly predictive models on random data
A number of times when using cross-validation (CV) while trying to do classification/probability estimation we have observed surprisingly low AUC's on real data with very few...
Claudia Perlich, Grzegorz Swirszcz
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
FQAS
2006
Springer
186views Database» more  FQAS 2006»
13 years 11 months ago
Project-Join-Repair: An Approach to Consistent Query Answering Under Functional Dependencies
Consistent query answering is the term commonly used for the problem of answering queries on databases that violate certain integrity constraints. We address this problem for univ...
Jef Wijsen
PKDD
2005
Springer
94views Data Mining» more  PKDD 2005»
14 years 27 days ago
Visual Terrain Analysis of High-Dimensional Datasets
Abstract. Most real-world datasets are, to a certain degree, skewed. When considered that they are also large, they become the pinnacle challenge in data analysis. More importantly...
Wenyuan Li, Kok-Leong Ong, Wee Keong Ng
JUCS
2006
225views more  JUCS 2006»
13 years 7 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke