Sciweavers

742 search results - page 102 / 149
» Information Management Challenges from the Aerospace Industr...
Sort
View
AEI
2007
91views more  AEI 2007»
13 years 8 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
CIKM
2009
Springer
14 years 2 months ago
Networks, communities and kronecker products
Emergence of the web and online computing applications gave rise to rich large scale social activity data. One of the principal challenges then is to build models and understandin...
Jure Leskovec
ISI
2004
Springer
14 years 1 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
WAIM
2004
Springer
14 years 1 months ago
Symbolic Agent Negotiation for Semantic Web Service Exploitation
This paper presents an architecture and a methodology for agent-based Web service discovery and automated composition. We assume that Web services are described with declarative sp...
Peep Küngas, Jinghai Rao, Mihhail Matskin
SIGIR
2010
ACM
13 years 11 months ago
Exploring the use of labels to shortcut search trails
Search trails comprising queries and Web page views are created as searchers engage in information-seeking activity online. During known-item search (where the objective may be to...
Ryen W. White, Raman Chandrasekar