Sciweavers

1701 search results - page 314 / 341
» Providing k-anonymity in data mining
Sort
View
KBSE
2009
IEEE
14 years 2 months ago
Code Completion from Abbreviated Input
—Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated inp...
Sangmok Han, David R. Wallace, Robert C. Miller
CIKM
2009
Springer
14 years 2 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
FQAS
2009
Springer
157views Database» more  FQAS 2009»
14 years 2 months ago
On Fuzzy vs. Metric Similarity Search in Complex Databases
Abstract. The task of similarity search is widely used in various areas of computing, including multimedia databases, data mining, bioinformatics, social networks, etc. For a long ...
Alan Eckhardt, Tomás Skopal, Peter Vojt&aac...
RECSYS
2009
ACM
14 years 1 months ago
TagiCoFi: tag informed collaborative filtering
Besides the rating information, an increasing number of modern recommender systems also allow the users to add personalized tags to the items. Such tagging information may provide...
Yi Zhen, Wu-Jun Li, Dit-Yan Yeung
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu