Sciweavers

8614 search results - page 1462 / 1723
» Mining
Sort
View
SIGMOD
2004
ACM
184views Database» more  SIGMOD 2004»
16 years 4 months ago
Identifying Similarities, Periodicities and Bursts for Online Search Queries
We present several methods for mining knowledge from the query logs of the MSN search engine. Using the query logs, we build a time series for each query word or phrase (e.g., `Th...
Michail Vlachos, Christopher Meek, Zografoula Vage...
SIGMOD
2003
ACM
121views Database» more  SIGMOD 2003»
16 years 4 months ago
An environmental sensor network to determine drinking water quality and security
Finding patterns in large, real, spatio/temporal data continues to attract high interest (e.g., sales of products over space and time, patterns in mobile phone users; sensor netwo...
Anastassia Ailamaki, Christos Faloutsos, Paul S. F...
PODS
2005
ACM
96views Database» more  PODS 2005»
16 years 4 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
EDBT
2004
ACM
142views Database» more  EDBT 2004»
16 years 4 months ago
Iterative Incremental Clustering of Time Series
We present a novel anytime version of partitional clustering algorithm, such as k-Means and EM, for time series. The algorithm works by leveraging off the multi-resolution property...
Jessica Lin, Michail Vlachos, Eamonn J. Keogh, Dim...
ICSE
2004
IEEE-ACM
16 years 3 months ago
An Empirical Study of Software Reuse vs. Defect-Density and Stability
The paper describes results of an empirical study, where some hypotheses about the impact of reuse on defect-density and stability, and about the impact of component size on defec...
Parastoo Mohagheghi, Reidar Conradi, Ole M. Killi,...
« Prev « First page 1462 / 1723 Last » Next »