Sciweavers

831 search results - page 32 / 167
» Finding Minimum Data Requirements Using Pseudo-independence
Sort
View
ICDE
2005
IEEE
121views Database» more  ICDE 2005»
14 years 11 months ago
Top-Down Specialization for Information and Privacy Preservation
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical and efficient algorithm for determining a generaliz...
Benjamin C. M. Fung, Ke Wang, Philip S. Yu
AUSAI
2003
Springer
14 years 3 months ago
Efficiently Mining Frequent Patterns from Dense Datasets Using a Cluster of Computers
Efficient mining of frequent patterns from large databases has been an active area of research since it is the most expensive step in association rules mining. In this paper, we pr...
Yudho Giri Sucahyo, Raj P. Gopalan, Amit Rudra
CLOUDCOM
2010
Springer
13 years 8 months ago
Scaling Populations of a Genetic Algorithm for Job Shop Scheduling Problems Using MapReduce
Inspired by Darwinian evolution, a genetic algorithm (GA) approach is one of the popular heuristic methods for solving hard problems, such as the Job Shop Scheduling Problem (JSSP...
Di-Wei Huang, Jimmy Lin
CAV
2008
Springer
113views Hardware» more  CAV 2008»
14 years 2 days ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
IJCAI
2003
13 years 11 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván