Sciweavers

1989 search results - page 279 / 398
» A framework for testing database applications
Sort
View
EDBT
2004
ACM
234views Database» more  EDBT 2004»
16 years 2 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
108
Voted
EDBTW
2010
Springer
15 years 9 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
123
Voted
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
15 years 9 months ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
101
Voted
CIKM
2009
Springer
15 years 9 months ago
ASIC: algebra-based structural index comparison
Structural indices play a significant role in improving the efficiency of XML query evaluation. Being able to compare various structural indexing techniques is critical for a DBM...
Yuqing Wu, Sofia Brenes, Tejas Totade, Shijin Josh...
117
Voted
RECSYS
2009
ACM
15 years 9 months ago
TagiCoFi: tag informed collaborative filtering
Besides the rating information, an increasing number of modern recommender systems also allow the users to add personalized tags to the items. Such tagging information may provide...
Yi Zhen, Wu-Jun Li, Dit-Yan Yeung