Sciweavers

1701 search results - page 307 / 341
» Providing k-anonymity in data mining
Sort
View
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
13 years 5 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
13 years 5 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 3 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
NAR
2007
115views more  NAR 2007»
13 years 7 months ago
DroSpeGe: rapid access database for new Drosophila species genomes
The Drosophila species comparative genome database DroSpeGe (http://insects.eugenes.org/ DroSpeGe/) provides genome researchers with rapid, usable access to 12 new and old Drosoph...
Donald G. Gilbert
BMCBI
2008
144views more  BMCBI 2008»
13 years 7 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath