Sciweavers

667 search results - page 131 / 134
» Private Mining of Association Rules
Sort
View
NAR
2007
111views more  NAR 2007»
13 years 8 months ago
PEDANT genome database: 10 years online
The PEDANT genome database provides exhaustive annotation of 468 genomes by a broad set of bioinformatics algorithms. We describe recent developments of the PEDANT Web server. The...
M. Louise Riley, Thorsten Schmidt, Irena I. Artamo...
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
15 years 8 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
DSN
2009
IEEE
14 years 3 months ago
System log pre-processing to improve failure prediction
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering ...
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Gei...
ICCS
2007
Springer
14 years 2 months ago
AIMSS: An Architecture for Data Driven Simulations in the Social Sciences
Abstract. This paper presents a prototype implementation of an intelligent assistance architecture for data-driven simulation specialising in qualitative data in the social science...
Catriona Kennedy, Georgios K. Theodoropoulos, Volk...
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 2 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...