Sciweavers

2715 search results - page 7 / 543
» Database Publication Practices
Sort
View
KDD
1998
ACM
123views Data Mining» more  KDD 1998»
13 years 12 months ago
Scaling Clustering Algorithms to Large Databases
Practical clustering algorithms require multiple data scans to achieve convergence. For large databases, these scans become prohibitively expensive. We present a scalable clusteri...
Paul S. Bradley, Usama M. Fayyad, Cory Reina
EDBT
2012
ACM
262views Database» more  EDBT 2012»
11 years 10 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
EUROPKI
2009
Springer
13 years 5 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
VLDB
2004
ACM
161views Database» more  VLDB 2004»
14 years 8 months ago
Supporting top-k join queries in relational databases
Ranking queries produce results that are ordered on some computed score. Typically, these queries involve joins, where users are usually interested only in the top-k join results....
Ihab F. Ilyas, Walid G. Aref, Ahmed K. Elmagarmid
ADVIS
2004
Springer
14 years 1 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan