Sciweavers

1251 search results - page 192 / 251
» Management of User Preferences in Data Intensive Application...
Sort
View
126
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 1 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
129
Voted
BMCBI
2010
107views more  BMCBI 2010»
15 years 3 months ago
TagCleaner: Identification and removal of tag sequences from genomic and metagenomic datasets
Background: Sequencing metagenomes that were pre-amplified with primer-based methods requires the removal of the additional tag sequences from the datasets. The sequenced reads ca...
Robert Schmieder, Yan Wei Lim, Forest Rohwer, Robe...
107
Voted
UIST
1997
ACM
15 years 7 months ago
Pick-and-Drop: A Direct Manipulation Technique for Multiple Computer Environments
This paper proposes a new field of user interfaces called multi-computer direct manipulation and presents a pen-based direct manipulation technique that can be used for data trans...
Jun Rekimoto
135
Voted
SAC
2006
ACM
15 years 3 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 6 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...