Sciweavers

1989 search results - page 279 / 398
» A framework for testing database applications
Sort
View
EDBT
2004
ACM
234views Database» more  EDBT 2004»
14 years 8 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
EDBTW
2010
Springer
14 years 2 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
14 years 2 months ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
CIKM
2009
Springer
14 years 2 months ago
ASIC: algebra-based structural index comparison
Structural indices play a significant role in improving the efficiency of XML query evaluation. Being able to compare various structural indexing techniques is critical for a DBM...
Yuqing Wu, Sofia Brenes, Tejas Totade, Shijin Josh...
RECSYS
2009
ACM
14 years 2 months ago
TagiCoFi: tag informed collaborative filtering
Besides the rating information, an increasing number of modern recommender systems also allow the users to add personalized tags to the items. Such tagging information may provide...
Yi Zhen, Wu-Jun Li, Dit-Yan Yeung