Sciweavers

1701 search results - page 330 / 341
» Providing k-anonymity in data mining
Sort
View
SIGMOD
2010
ACM
277views Database» more  SIGMOD 2010»
13 years 11 months ago
A comparison of join algorithms for log processing in MaPreduce
The MapReduce framework is increasingly being used to analyze large volumes of data. One important type of data analysis done with MapReduce is log processing, in which a click-st...
Spyros Blanas, Jignesh M. Patel, Vuk Ercegovac, Ju...
ELPUB
2007
ACM
13 years 10 months ago
Automatic Sentiment Analysis in On-line Text
The growing stream of content placed on the Web provides a huge collection of textual resources. People share their experiences on-line, ventilate their opinions (and frustrations...
Erik Boiy, Pieter Hens, Koen Deschacht, Marie-Fran...
CIKM
2008
Springer
13 years 8 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
CORR
2004
Springer
180views Education» more  CORR 2004»
13 years 6 months ago
Self-Organized Stigmergic Document Maps: Environment as a Mechanism for Context Learning
Social insect societies and more specifically ant colonies, are distributed systems that, in spite of the simplicity of their individuals, present a highly structured social organi...
Vitorino Ramos, Juan J. Merelo Guervós
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 8 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...