This talk deals with advanced concepts of Artificial Intelligence (AI) and Pattern Recognition (PR), and their applications to solving real life problems including biometrics appl...
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...
We present a model of evolution of large social networks. Our model is based on the local nature of communication: a node's communication energy is spend mostly within it'...
Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kel...
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
ABSTRACT. Schema matching is a crucial task to gather information of the same domain. However, this process is still largely performed manually or semi-automatically, discouraging ...
In this paper, we propose managing data summaries in unstructured P2P systems. Our summaries are intelligible views with two main virtues. First, they can be directly queried and u...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...