Sciweavers

585 search results - page 57 / 117
» The project fragmentation problem in personal information ma...
Sort
View
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
14 years 9 months ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
KDD
2009
ACM
249views Data Mining» more  KDD 2009»
14 years 9 months ago
Drosophila gene expression pattern annotation using sparse features and term-term interactions
The Drosophila gene expression pattern images document the spatial and temporal dynamics of gene expression and they are valuable tools for explicating the gene functions, interac...
Shuiwang Ji, Lei Yuan, Ying-Xin Li, Zhi-Hua Zhou, ...
ICDE
2005
IEEE
63views Database» more  ICDE 2005»
14 years 2 months ago
Privacy Contracts as an Extension of Privacy Policies
Individuals are becoming increasingly concerned regarding the protection of their personal information. In an attempt to ease the privacy concerns of individuals, organisations pu...
Hendrik J. G. Oberholzer, Martin S. Olivier
CCS
2009
ACM
14 years 9 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
CIKM
2008
Springer
13 years 11 months ago
A heuristic approach for checking containment of generalized tree-pattern queries
Query processing techniques for XML data have focused mainly on tree-pattern queries (TPQs). However, the need for querying XML data sources whose structure is very complex or not...
Pawel Placek, Dimitri Theodoratos, Stefanos Soulda...