Sciweavers

1701 search results - page 262 / 341
» Providing k-anonymity in data mining
Sort
View
CCR
2006
76views more  CCR 2006»
13 years 10 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
CIKM
2009
Springer
14 years 4 months ago
iPoG: fast interactive proximity querying on graphs
Given an author-conference graph, how do we answer proximity queries (e.g., what are the most related conferences for John Smith?); how can we tailor the search result if the user...
Hanghang Tong, Huiming Qu, Hani Jamjoom, Christos ...
FBIT
2007
IEEE
14 years 4 months ago
Evaluation of a Dominance-Based Rough Set Approach to Interface Design
This paper explores refinements to methods used in a procedure being developed by the authors to personalize user interfaces for online shopping support tools. In the authors’ ...
Timothy Maciag, Daryl H. Hepting, Robert J. Hilder...
KDD
2001
ACM
222views Data Mining» more  KDD 2001»
14 years 2 months ago
The PERSEUS Project: Creating Personalized Multimedia News Portal
This paper describes the Perseus project, which is devoted to developing techniques and tools for creating personalized multimedia news portals. The purpose of a personalized mult...
Victor Kulesh, Valery A. Petrushin, Ishwar K. Seth...
ACMSE
2007
ACM
14 years 1 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy