Sciweavers

331 search results - page 64 / 67
» How Applicable is Your Evaluation Methods - Really
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 9 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
14 years 9 months ago
On-board analysis of uncalibrated data for a spacecraft at mars
Analyzing data on-board a spacecraft as it is collected enables several advanced spacecraft capabilities, such as prioritizing observations to make the best use of limited bandwid...
Benyang Tang, Kiri Wagstaff, Rebecca Castañ...
SOSP
2007
ACM
14 years 5 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan
EMSOFT
2007
Springer
14 years 2 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
CIKM
2009
Springer
14 years 1 months ago
Probabilistic skyline queries
The ability to deal with uncertain information is becoming increasingly important for modern database applications. Whereas a conventional (certain) object is usually represented ...
Christian Böhm, Frank Fiedler, Annahita Oswal...