Sciweavers

48 search results - page 4 / 10
» Data Provenance: Some Basic Issues
Sort
View
CCS
2007
ACM
14 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CAISE
2007
Springer
14 years 3 months ago
Automatic Generation of Model Translations
Abstract. The translation of information between heterogeneous representations is a long standing issue. With the large spreading of cooperative applications fostered by the advent...
Paolo Papotti, Riccardo Torlone
PKDD
2007
Springer
86views Data Mining» more  PKDD 2007»
14 years 3 months ago
An Effective Approach to Enhance Centroid Classifier for Text Categorization
Centroid Classifier has been shown to be a simple and yet effective method for text categorization. However, it is often plagued with model misfit (or inductive bias) incurred by i...
Songbo Tan, Xueqi Cheng
MA
2000
Springer
115views Communications» more  MA 2000»
14 years 1 months ago
Quantitative Evaluation of Pairwise Interactions between Agents
Abstract. Systems comprised of multiple interacting mobile agents provide an alternate network computing paradigm that integrates remote data access, message exchange and migration...
Takahiro Kawamura, Sam Joseph, Akihiko Ohsuga, Shi...
WEBI
2004
Springer
14 years 3 months ago
Mining Local Data Sources For Learning Global Cluster Models
— Distributed data mining has recently caught a lot of attention as there are many cases where pooling distributed data for mining is probibited, due to either huge data volume o...
Chak-Man Lam, Xiaofeng Zhang, William Kwok-Wai Che...