Sciweavers

4131 search results - page 760 / 827
» The Generalized Max-Controlled Set Problem
Sort
View
152
Voted
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 7 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...
SIGMOD
2010
ACM
262views Database» more  SIGMOD 2010»
15 years 7 months ago
K-nearest neighbor search for fuzzy objects
The K-Nearest Neighbor search (kNN) problem has been investigated extensively in the past due to its broad range of applications. In this paper we study this problem in the contex...
Kai Zheng, Gabriel Pui Cheong Fung, Xiaofang Zhou
117
Voted
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 7 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
135
Voted
ACMDIS
2000
ACM
15 years 7 months ago
PaperButtons: Expanding a Tangible User Interface
: Expanding the functionality of a successful system is always a challenge; the initial simplicity and ease-of-use is easily lost in the process. Experience indicates that this pro...
Elin Rønby Pedersen, Tomas Sokoler, Les Nel...
ICCV
1998
IEEE
15 years 6 months ago
Condensing Image Databases when Retrieval is Based on Non-Metric Distances
One of the key problems in appearance-based vision is understanding how to use a set of labeled images to classify new images. Classification systems that can model human performa...
David W. Jacobs, Daphna Weinshall, Yoram Gdalyahu