Sciweavers

114 search results - page 21 / 23
» When do data mining results violate privacy
Sort
View
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 8 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
14 years 1 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
MMS
2000
13 years 7 months ago
SMDP: Minimizing Buffer Requirements for Continuous Media Servers
Excessive buffer requirement to handle continuous-media playbacks is an impediment to costeffective provisioning for on-line video retrieval. Given the skewed distribution of video...
Youjip Won, Jaideep Srivastava
CCS
2004
ACM
14 years 24 days ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
KDD
2010
ACM
274views Data Mining» more  KDD 2010»
13 years 11 months ago
Grafting-light: fast, incremental feature selection and structure learning of Markov random fields
Feature selection is an important task in order to achieve better generalizability in high dimensional learning, and structure learning of Markov random fields (MRFs) can automat...
Jun Zhu, Ni Lao, Eric P. Xing