Sciweavers

467 search results - page 89 / 94
» Processing top k queries from samples
Sort
View
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
12 years 9 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
ICPR
2000
IEEE
14 years 8 months ago
Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis
Micromachined picoliter vials in silicon dioxide with a typical depth of 6.0?m are filled with a liquid sample. Epiilluminated microscopic imaging during evaporation of the liquid...
L. R. Van den Doel, Lucas J. van Vliet, K. T. Hjel...
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 7 months ago
Probabilistic author-topic models for information discovery
We propose a new unsupervised learning technique for extracting information from large text collections. We model documents as if they were generated by a two-stage stochastic pro...
Mark Steyvers, Padhraic Smyth, Michal Rosen-Zvi, T...
BMCBI
2008
99views more  BMCBI 2008»
13 years 7 months ago
Binning sequences using very sparse labels within a metagenome
Background: In metagenomic studies, a process called binning is necessary to assign contigs that belong to multiple species to their respective phylogenetic groups. Most of the cu...
Chon-Kit Kenneth Chan, Arthur L. Hsu, Saman K. Hal...
EDBT
2009
ACM
113views Database» more  EDBT 2009»
14 years 1 months ago
Supporting annotations on relations
Annotations play a key role in understanding and curating databases. Annotations may represent comments, descriptions, lineage information, among several others. Annotation manage...
Mohamed Y. Eltabakh, Walid G. Aref, Ahmed K. Elmag...