Sciweavers

1998 search results - page 316 / 400
» Basic Association Rules
Sort
View
KDD
2002
ACM
166views Data Mining» more  KDD 2002»
14 years 10 months ago
Frequent term-based text clustering
Text clustering methods can be used to structure large sets of text or hypertext documents. The well-known methods of text clustering, however, do not really address the special p...
Florian Beil, Martin Ester, Xiaowei Xu
CADE
2008
Springer
14 years 10 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 10 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
ICFP
2004
ACM
14 years 10 months ago
Translating dependency into parametricity
Abadi et al. introduced the dependency core calculus (DCC) as a unifying framework to study many important program analyses such as binding time, information flow, slicing, and fu...
Stephen Tse, Steve Zdancewic
IUI
2009
ACM
14 years 6 months ago
Predictive text input in a mobile shopping assistant: methods and interface design
The fundamental nature of grocery shopping makes it an interesting domain for intelligent mobile assistants. Even though the central role of shopping lists is widely recognized, r...
Petteri Nurmi, Andreas Forsblom, Patrik Flor&eacut...