Sciweavers

1701 search results - page 281 / 341
» Providing k-anonymity in data mining
Sort
View
CIKM
2009
Springer
14 years 4 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
ISVC
2009
Springer
14 years 4 months ago
LightShop: An Interactive Lighting System Incorporating the 2D Image Editing Paradigm
Lighting is a fundamental and important process in the 3D animation pipeline. Conventional lighting workflow is time-consuming and labor-intensive. A user must fiddle with a rang...
Younghui Kim, Junyong Noh
CIDM
2007
IEEE
14 years 4 months ago
Reactive Query Policies: A Formalism for Planning with Volatile External Information
— To generate plans for collecting data for data mining, an important problem is information volatility during planning: the information needed by the planning system may change ...
Tsz-Chiu Au, Dana S. Nau
JCDL
2006
ACM
133views Education» more  JCDL 2006»
14 years 3 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
OTM
2005
Springer
14 years 3 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee