Sciweavers

64 search results - page 12 / 13
» An Extensible Framework for Database Security Assessment and...
Sort
View
148
Voted
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 7 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
117
Voted
KDD
2010
ACM
194views Data Mining» more  KDD 2010»
15 years 7 months ago
Versatile publishing for privacy preservation
Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...
135
Voted
CIVR
2006
Springer
15 years 7 months ago
Query by Semantic Example
A combination of query-by-visual-example (QBVE) and semantic retrieval (SR), denoted as query-by-semantic-example (QBSE), is proposed. Images are labeled with respect to a vocabula...
Nikhil Rasiwasia, Nuno Vasconcelos, Pedro J. Moren...
150
Voted
BMCBI
2008
182views more  BMCBI 2008»
15 years 3 months ago
MiMiR - an integrated platform for microarray data sharing, mining and analysis
Background: Despite considerable efforts within the microarray community for standardising data format, content and description, microarray technologies present major challenges i...
Chris Tomlinson, Manjula Thimma, Stelios Alexandra...
121
Voted
CIKM
2009
Springer
15 years 10 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson