RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
Abstraction and Data Mining with Visualization of Laboratory Data Katsuhiko Takabayashi a , Tu Bao Ho b , Hideto Yokoi c , Trong Dung Nguyen b , Saori Kawasaki b , Si Quang Le b , ...
Katsuhiko Takabayashi, Tu Bao Ho, Hideto Yokoi, Tr...
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
E-science applications use fine grained data provenance to maintain the reproducibility of scientific results, i.e., for each processed data tuple, the source data used to proce...
Mohammad Rezwanul Huq, Andreas Wombacher, Peter M....
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...