Sciweavers

117 search results - page 10 / 24
» Data Provenance: A Categorization of Existing Approaches
Sort
View
KAIS
2006
77views more  KAIS 2006»
13 years 8 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
14 years 9 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
JUCS
2008
142views more  JUCS 2008»
13 years 8 months ago
Analyzing Wiki-based Networks to Improve Knowledge Processes in Organizations
: Increasingly wikis are used to support existing corporate knowledge exchange processes. They are an appropriate software solution to support knowledge processes. However, it is n...
Claudia Müller, Benedikt Meuthrath, Anne Baum...
KDD
2009
ACM
221views Data Mining» more  KDD 2009»
14 years 9 months ago
Migration motif: a spatial - temporal pattern mining approach for financial markets
A recent study by two prominent finance researchers, Fama and French, introduces a new framework for studying risk vs. return: the migration of stocks across size-value portfolio ...
Xiaoxi Du, Ruoming Jin, Liang Ding, Victor E. Lee,...
ECAI
2004
Springer
14 years 1 months ago
Introducing Alias Information into Model-Based Debugging
Model-based diagnosis applied to computer programs has been studied for several years. Although there are still weaknesses in the used models, especially on dealing with dynamic da...
Daniel Köb, Franz Wotawa