Sciweavers

6484 search results - page 1259 / 1297
» Physical Database Design
Sort
View
123
Voted
ESORICS
2009
Springer
16 years 3 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
130
Voted
KDD
2009
ACM
162views Data Mining» more  KDD 2009»
16 years 3 months ago
TrustWalker: a random walk model for combining trust-based and item-based recommendation
Collaborative filtering is the most popular approach to build recommender systems and has been successfully employed in many applications. However, it cannot make recommendations ...
Mohsen Jamali, Martin Ester
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
16 years 3 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
KDD
2008
ACM
153views Data Mining» more  KDD 2008»
16 years 3 months ago
Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry
Text classification has matured as a research discipline over the last decade. Independently, business intelligence over structured databases has long been a source of insights fo...
Shantanu Godbole, Shourya Roy
140
Voted
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
16 years 3 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
« Prev « First page 1259 / 1297 Last » Next »