Sciweavers

292 search results - page 7 / 59
» Exploiting Dead Value Information
Sort
View
ACMICEC
2003
ACM
104views ECommerce» more  ACMICEC 2003»
14 years 21 days ago
Document exchange model for augmenting added value of B2B collaboration
In this paper we present a B2B integration project, which aims to augment the added value of services instead of improving efficiency by automating processes. This paper introduce...
Koichi Hayashi, Riichiro Mizoguchi
WPES
2006
ACM
14 years 1 months ago
A study on the value of location privacy
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...
PVLDB
2010
159views more  PVLDB 2010»
13 years 5 months ago
Explore or Exploit? Effective Strategies for Disambiguating Large Databases
Data ambiguity is inherent in applications such as data integration, location-based services, and sensor monitoring. In many situations, it is possible to “clean”, or remove, ...
Reynold Cheng, Eric Lo, Xuan Yang, Ming-Hay Luk, X...
EDBT
2009
ACM
81views Database» more  EDBT 2009»
14 years 2 days ago
Exploiting similarity-aware grouping in decision support systems
Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these systems are built on top of data managed by DBMSs and make e...
Yasin N. Silva, Muhammad U. Arshad, Walid G. Aref
AAAI
2011
12 years 7 months ago
Exploiting Phase Transition in Latent Networks for Clustering
In this paper, we model the pair-wise similarities of a set of documents as a weighted network with a single cutoff parameter. Such a network can be thought of an ensemble of unwe...
Vahed Qazvinian, Dragomir R. Radev