Sciweavers

114 search results - page 17 / 23
» When do data mining results violate privacy
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
14 years 8 months ago
Invalidation Clues for Database Scalability Services
For their scalability needs, data-intensive Web applications can use a Database Scalability Service (DBSS), which caches applications' query results and answers queries on th...
Amit Manjhi, Phillip B. Gibbons, Anastassia Ailama...
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
13 years 8 months ago
Simultaneous Unsupervised Learning of Disparate Clusterings
Most clustering algorithms produce a single clustering for a given data set even when the data can be clustered naturally in multiple ways. In this paper, we address the difficult...
Prateek Jain, Raghu Meka, Inderjit S. Dhillon
IAAI
2003
13 years 8 months ago
A Cellular Telephone-Based Application for Skin-Grading to Support Cosmetic Sales
We have developed a sales support system for door-todoor sales of cosmetics based on a skin-image grading system called Skin-CRM (Skin Customer Relationship Management). Our Skin-...
Hironori Hiraishi, Fumio Mizoguchi
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
14 years 1 months ago
Multi-task Feature Selection Using the Multiple Inclusion Criterion (MIC)
Abstract. We address the problem of joint feature selection in multiple related classification or regression tasks. When doing feature selection with multiple tasks, usually one c...
Paramveer S. Dhillon, Brian Tomasik, Dean P. Foste...