Sciweavers

1701 search results - page 254 / 341
» Providing k-anonymity in data mining
Sort
View
BMCBI
2008
126views more  BMCBI 2008»
13 years 10 months ago
GeneChaser: Identifying all biological and clinical conditions in which genes of interest are differentially expressed
Background: The amount of gene expression data in the public repositories, such as NCBI Gene Expression Omnibus (GEO) has grown exponentially, and provides a gold mine for bioinfo...
Rong Chen, Rohan Mallelwar, Ajit Thosar, Shivkumar...
SIGIR
2012
ACM
12 years 11 days ago
Predicting quality flaws in user-generated content: the case of wikipedia
The detection and improvement of low-quality information is a key concern in Web applications that are based on user-generated content; a popular example is the online encyclopedi...
Maik Anderka, Benno Stein, Nedim Lipka
WWW
2001
ACM
14 years 10 months ago
Clustering user queries of a search engine
In order to increase retrieval precision, some new search engines provide manually verified answers to Frequently Asked Queries (FAQs). An underlying task is the identification of...
Ji-Rong Wen, Jian-Yun Nie, HongJiang Zhang
RSFDGRC
2005
Springer
151views Data Mining» more  RSFDGRC 2005»
14 years 3 months ago
DIXER - Distributed Executor for Rough Set Exploration System
We present the Distributed Executor for RSES (DIXER) which is a supplementary software for the Rough Set Exploration System (RSES). It takes an advantage of grid computing paradigm...
Jan G. Bazan, Rafal Latkowski, Marcin S. Szczuka
VLDB
2005
ACM
79views Database» more  VLDB 2005»
14 years 3 months ago
General Purpose Database Summarization
In this paper, a message-oriented architecture for large database summarization is presented. The summarization system takes a database table as input and produces a reduced versi...
Régis Saint-Paul, Guillaume Raschia, Noured...