Sciweavers

3272 search results - page 540 / 655
» Privacy in Data Publishing
Sort
View
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
14 years 9 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
14 years 4 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
IPSN
2010
Springer
14 years 4 months ago
Consensus-based distributed linear support vector machines
This paper develops algorithms to train linear support vector machines (SVMs) when training data are distributed across different nodes and their communication to a centralized no...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
DEXAW
2009
IEEE
139views Database» more  DEXAW 2009»
14 years 4 months ago
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Abstract—Search context is a crucial factor that helps to understand a user’s information need in ad-hoc Web page retrieval. A query log of a search engine contains rich inform...
Rongmei Li
SACMAT
2009
ACM
14 years 3 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...