Sciweavers

1779 search results - page 289 / 356
» A Formal Model of Data Privacy
Sort
View
TKDE
2012
190views Formal Methods» more  TKDE 2012»
13 years 6 months ago
Scalable Learning of Collective Behavior
—This study of collective behavior is to understand how individuals behave in a social networking environment. Oceans of data generated by social media like Facebook, Twitter, Fl...
Lei Tang, Xufei Wang, Huan Liu
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 4 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
WWW
2008
ACM
16 years 4 months ago
Querying for meta knowledge
The Semantic Web is based on accessing and reusing RDF data from many different sources, which one may assign different levels of authority and credibility. Existing Semantic Web ...
Bernhard Schueler, Sergej Sizov, Steffen Staab, Du...
AI
2004
Springer
15 years 3 months ago
A selective sampling approach to active feature selection
Feature selection, as a preprocessing step to machine learning, has been very effective in reducing dimensionality, removing irrelevant data, increasing learning accuracy, and imp...
Huan Liu, Hiroshi Motoda, Lei Yu
130
Voted
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 4 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson