Sciweavers

3176 search results - page 445 / 636
» A Multi-Resolution Relational Data Model
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 9 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
IPPS
2009
IEEE
14 years 3 months ago
Compact graph representations and parallel connectivity algorithms for massive dynamic network analysis
Graph-theoretic abstractions are extensively used to analyze massive data sets. Temporal data streams from socioeconomic interactions, social networking web sites, communication t...
Kamesh Madduri, David A. Bader
ICIP
2008
IEEE
14 years 3 months ago
Correlation Embedding Analysis
—Beyond conventional linear and kernel-based feature extraction, we present a more generalized formulation for feature extraction in this paper. Two representative algorithms usi...
Yun Fu, Thomas S. Huang
ICDM
2007
IEEE
187views Data Mining» more  ICDM 2007»
14 years 3 months ago
A Comparative Study of Methods for Transductive Transfer Learning
The problem of transfer learning, where information gained in one learning task is used to improve performance in another related task, is an important new area of research. While...
Andrew Arnold, Ramesh Nallapati, William W. Cohen
VLDB
2007
ACM
96views Database» more  VLDB 2007»
14 years 3 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...