Sciweavers

3272 search results - page 639 / 655
» Privacy in Data Publishing
Sort
View
ICDT
2012
ACM
235views Database» more  ICDT 2012»
11 years 11 months ago
Equivalence and minimization of conjunctive queries under combined semantics
The problems of query containment, equivalence, and minimization are recognized as very important in the context of query processing, specifically of query optimization. In their...
Rada Chirkova
BMCBI
2008
128views more  BMCBI 2008»
13 years 9 months ago
Meta-analysis of breast cancer microarray studies in conjunction with conserved cis-elements suggest patterns for coordinate reg
Background: Gene expression measurements from breast cancer (BrCa) tumors are established clinical predictive tools to identify tumor subtypes, identify patients showing poor/good...
David D. Smith, Pål Sætrom, Ola R. Sn&...
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 9 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
MOBISYS
2009
ACM
14 years 9 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
CIKM
2009
Springer
14 years 3 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...