Sciweavers

1457 search results - page 261 / 292
» Privacy Challenges for Database Systems
Sort
View
CSCW
2012
ACM
12 years 3 months ago
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search
People often find useful content on the web via social media. However, it is difficult to manually aggregate the information and recommendations embedded in a torrent of social ...
Abhinay Nagpal, Sudheendra Hangal, Rifat Reza Joye...
ICDT
2009
ACM
143views Database» more  ICDT 2009»
14 years 8 months ago
Automatic construction of simple artifact-based business processes
Almost all medium- and large-scale businesses rely on electronic workflow systems to manage their business processes. A key challenge is to enable the easy re-use and modification...
Christian Fritz, Richard Hull, Jianwen Su
PODS
2009
ACM
134views Database» more  PODS 2009»
14 years 8 months ago
An efficient rigorous approach for identifying statistically significant frequent itemsets
As advances in technology allow for the collection, storage, and analysis of vast amounts of data, the task of screening and assessing the significance of discovered patterns is b...
Adam Kirsch, Michael Mitzenmacher, Andrea Pietraca...
CIKM
2009
Springer
14 years 2 months ago
MKEM: a multi-level knowledge emergence model for mining undiscovered public knowledge
Background: Since Swanson proposed the Undiscovered Public Knowledge (UPK) model, there have been many approaches to uncover UPK by mining the biomedical literature. These earlier...
Ali Zeeshan Ijaz, Min Song, Doheon Lee
CGO
2007
IEEE
14 years 2 months ago
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications
Run-time compilation systems are challenged with the task of translating a program’s instruction stream while maintaining low overhead. While software managed code caches are ut...
Vijay Janapa Reddi, Dan Connors, Robert Cohn, Mich...