Sciweavers

3509 search results - page 43 / 702
» Yours, Mine and Ours
Sort
View
HASKELL
2009
ACM
14 years 4 months ago
Finding the needle: stack traces for GHC
Even Haskell programs can occasionally go wrong. Programs calling head on an empty list, and incomplete patterns in function definitions can cause program crashes, reporting littl...
Tristan O. R. Allwood, Simon Peyton Jones, Susan E...
CCS
2006
ACM
14 years 1 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
ICEB
2004
175views Business» more  ICEB 2004»
13 years 11 months ago
Privacy-Preserving Data Mining in Electronic Surveys
Electronic surveys are an important resource in data mining. However, how to protect respondents' data privacy during the survey is a challenge to the security and privacy co...
Justin Z. Zhan, Stan Matwin
PAKDD
2009
ACM
87views Data Mining» more  PAKDD 2009»
14 years 4 months ago
Application-Independent Feature Construction from Noisy Samples
When training classifiers, presence of noise can severely harm their performance. In this paper, we focus on “non-class” attribute noise and we consider how a frequent fault-t...
Dominique Gay, Nazha Selmaoui, Jean-Françoi...
KDD
2005
ACM
106views Data Mining» more  KDD 2005»
14 years 10 months ago
Simultaneous optimization of complex mining tasks with a knowledgeable cache
With an increasing use of data mining tools and techniques, we envision that a Knowledge Discovery and Data Mining System (KDDMS) will have to support and optimize for the followi...
Ruoming Jin, Kaushik Sinha, Gagan Agrawal