Sciweavers

243 search results - page 28 / 49
» Privacy Preserving in Clustering using Fuzzy Sets
Sort
View
CODES
2006
IEEE
14 years 2 months ago
Fuzzy decision making in embedded system design
The use of Application Specific Instruction-set Processors (ASIP) is a solution to the problem of increasing complexity in embedded systems design. One of the major challenges in...
Alessandro G. Di Nuovo, Maurizio Palesi, Davide Pa...
EDBT
2004
ACM
192views Database» more  EDBT 2004»
14 years 8 months ago
LIMBO: Scalable Clustering of Categorical Data
Abstract. Clustering is a problem of great practical importance in numerous applications. The problem of clustering becomes more challenging when the data is categorical, that is, ...
Periklis Andritsos, Panayiotis Tsaparas, Ren&eacut...
CCS
2006
ACM
14 years 10 days ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
BMCBI
2008
171views more  BMCBI 2008»
13 years 8 months ago
Fuzzy association rules for biological data analysis: A case study on yeast
Background: Last years' mapping of diverse genomes has generated huge amounts of biological data which are currently dispersed through many databases. Integration of the info...
Francisco J. Lopez, Armando Blanco, Fernando Garci...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 9 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson