Sciweavers

2608 search results - page 437 / 522
» Inferring Answers to Queries
Sort
View
ICPR
2006
IEEE
16 years 5 months ago
Bayesian Feedback in Data Clustering
In many clustering applications, the user has some vague notion of the number and membership of the desired clusters. However, it is difficult for the user to provide such knowled...
Anil K. Jain, Pavan Kumar Mallapragada, Martin H. ...
215
Voted
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 4 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
EWSN
2008
Springer
16 years 3 months ago
Discovery of Frequent Distributed Event Patterns in Sensor Networks
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
Kay Römer
ICDCS
2009
IEEE
16 years 1 months ago
CAP: A Context-Aware Privacy Protection System for Location-Based Services
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses ...
Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu,...
121
Voted
ALT
2009
Springer
16 years 1 months ago
Iterative Learning from Texts and Counterexamples Using Additional Information
Abstract. A variant of iterative learning in the limit (cf. [LZ96]) is studied when a learner gets negative examples refuting conjectures containing data in excess of the target la...
Sanjay Jain, Efim B. Kinber