Sciweavers

2705 search results - page 156 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
STORAGESS
2006
ACM
14 years 4 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
SOUPS
2005
ACM
14 years 3 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
ADMA
2008
Springer
240views Data Mining» more  ADMA 2008»
14 years 4 months ago
Automatic Web Tagging and Person Tagging Using Language Models
Abstract. Social bookmarking has become an important web2.0 application recently, which is concerned with the dual user behavior to search - tagging. Although social bookmarking we...
Qiaozhu Mei, Yi Zhang
ICDE
2006
IEEE
222views Database» more  ICDE 2006»
14 years 11 months ago
CLAN: An Algorithm for Mining Closed Cliques from Large Dense Graph Databases
Most previously proposed frequent graph mining algorithms are intended to find the complete set of all frequent, closed subgraphs. However, in many cases only a subset of the freq...
Jianyong Wang, Zhiping Zeng, Lizhu Zhou
KDD
2001
ACM
149views Data Mining» more  KDD 2001»
14 years 10 months ago
Maximum entropy methods for biological sequence modeling
Many of the same modeling methods used in natural languages, speci cally Markov models and HMM's, have also been applied to biological sequence analysis. In recent years, nat...
Eugen C. Buehler, Lyle H. Ungar