SNPI

Displaying 1-2 of 2 results

  • White Papers // Dec 2012

    Data Leakage Detection Using K-Anonymity Algorithm

    A data distributor or a Business Process Outsourcing (BPO) company distributes sensitive data to a set of trusted companies or a set of agents (third parties). Some data can be leaked and found in an unauthorized place. The distributor will be identified by the agent who receives the actual data....

    Provided By SNPI

  • White Papers // Nov 2012

    Semantic Similarity Approach Using RSVM Based on Personalized Search in Web Search Engine

    Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, document clustering, and automatic metadata extraction. The optimal combination of page count based word co-occurrence measures and the lexical pattern clusters are learned using support vector machine. The...

    Provided By SNPI

  • White Papers // Dec 2012

    Data Leakage Detection Using K-Anonymity Algorithm

    A data distributor or a Business Process Outsourcing (BPO) company distributes sensitive data to a set of trusted companies or a set of agents (third parties). Some data can be leaked and found in an unauthorized place. The distributor will be identified by the agent who receives the actual data....

    Provided By SNPI

  • White Papers // Nov 2012

    Semantic Similarity Approach Using RSVM Based on Personalized Search in Web Search Engine

    Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, document clustering, and automatic metadata extraction. The optimal combination of page count based word co-occurrence measures and the lexical pattern clusters are learned using support vector machine. The...

    Provided By SNPI