Sciweavers

1701 search results - page 295 / 341
» Providing k-anonymity in data mining
Sort
View
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
14 years 4 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
ICTAI
2007
IEEE
14 years 4 months ago
Constructing VEGGIE: Machine Learning for Context-Sensitive Graph Grammars
Context-sensitive graph grammar construction tools have been used to develop and study interesting languages. However, the high dimensionality of graph grammars result in costly e...
Keven Ates, Kang Zhang
ACSC
2006
IEEE
14 years 3 months ago
Unsupervised band removal leading to improved classification accuracy of hyperspectral images
Remotely-sensed images of the earth’s surface are used across a wide range of industries and applications including agriculture, mining, defence, geography and geology, to name ...
R. Ian Faulconbridge, Mark R. Pickering, Michael J...
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
IDEAS
2006
IEEE
109views Database» more  IDEAS 2006»
14 years 3 months ago
Collaborative Filtering Process in a Whole New Light
Collaborative Filtering (CF) Systems are gaining widespread acceptance in recommender systems and ecommerce applications. These systems combine information retrieval and data mini...
Panagiotis Symeonidis, Alexandros Nanopoulos, Apos...