Sciweavers

1148 search results - page 181 / 230
» Representing Data Quality for Streaming and Static Data
Sort
View
ANOR
2011
175views more  ANOR 2011»
14 years 11 months ago
Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection
A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentialit...
Fred Glover, Lawrence H. Cox, Rahul Patil, James P...
BMCBI
2011
14 years 11 months ago
GCOD - GeneChip Oncology Database
Background: DNA microarrays have become a nearly ubiquitous tool for the study of human disease, and nowhere is this more true than in cancer. With hundreds of studies and thousan...
Fenglong Liu, Joseph White, Corina Antonescu, John...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 11 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
BPM
2009
Springer
258views Business» more  BPM 2009»
15 years 11 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
RE
2007
Springer
15 years 10 months ago
Value-Based Requirements Traceability: Lessons Learned
Abstract. Traceability from requirements to code is mandated by numerous software development standards. These standards, however, are not explicit about the appropriate level of q...
Alexander Egyed, Paul Grünbacher, Matthias He...