Sciweavers

1276 search results - page 137 / 256
» Multithreaded Value Prediction
Sort
View
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
14 years 1 months ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
ADBIS
2006
Springer
165views Database» more  ADBIS 2006»
14 years 14 hour ago
Fragmenting XML Documents via Structural Constraints
Abstract. XML query processors suffer from main-memory limitations that prevent them from processing large XML documents. While content-based predicates can be used to project down...
Angela Bonifati, Alfredo Cuzzocrea, Bruno Zinno
ERSHOV
2006
Springer
13 years 12 months ago
On the Importance of Parameter Tuning in Text Categorization
Abstract. Text Categorization algorithms have a large number of parameters that determine their behaviour, whose effect is not easily predicted objectively or intuitively and may v...
Cornelis H. A. Koster, Jean Beney
AINA
2010
IEEE
13 years 11 months ago
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
Abstract—We propose PRoPHET+, a routing scheme for opportunistic networks designed to maximize successful data delivery rate and minimize transmission delay. PRoPHET+ computes a ...
Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen
CMG
2008
13 years 9 months ago
Computing Missing Service Demand Parameters for Performance Models
One of the challenges in building analytic performance models such as queuing network models is obtaining service demands for the various workloads and various devices. While some...
Daniel A. Menascé