Sciweavers

313 search results - page 12 / 63
» Using Recon for Data Cleaning
Sort
View
DKE
2008
98views more  DKE 2008»
13 years 7 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
ICDE
2011
IEEE
281views Database» more  ICDE 2011»
12 years 11 months ago
Declarative analysis of noisy information networks
—There is a growing interest in methods for analyzing data describing networks of all types, including information, biological, physical, and social networks. Typically the data ...
Walaa Eldin Moustafa, Galileo Namata, Amol Deshpan...
MOBIDE
2006
ACM
14 years 1 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
OSDI
2000
ACM
13 years 8 months ago
Towards Higher Disk Head Utilization: Extracting "Free" Bandwidth from Busy Disk Drives
Freeblock scheduling is a new approach to utilizing more of disks' potential media bandwidths. By filling rotational latency periods with useful media transfers, 20{50% of a ...
Christopher R. Lumb, Jiri Schindler, Gregory R. Ga...
BNCOD
2001
101views Database» more  BNCOD 2001»
13 years 8 months ago
Limiting Result Cardinalities for Multidatabase Queries Using Histograms
Abstract. Integrating, cleaning and analyzing data from heterogeneous sources is often complicated by the large amounts of data and its physical distribution which can result in po...
Kai-Uwe Sattler, Oliver Dunemann, Ingolf Geist, Gu...