Sciweavers

TKDE
2008
162views more  TKDE 2008»
13 years 11 months ago
Continuous k-Means Monitoring over Moving Objects
Given a dataset P, a k-means query returns k points in space (called centers), such that the average squared distance between each point in P and its nearest center is minimized. S...
Zhenjie Zhang, Yin Yang, Anthony K. H. Tung, Dimit...
TKDE
2008
111views more  TKDE 2008»
13 years 11 months ago
A Point Symmetry-Based Clustering Technique for Automatic Evolution of Clusters
In this paper, a new symmetry-based genetic clustering algorithm is proposed which automatically evolves the number of clusters as well as the proper partitioning from a data set. ...
Sanghamitra Bandyopadhyay, Sriparna Saha
TKDE
2008
122views more  TKDE 2008»
13 years 11 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
TKDE
2008
126views more  TKDE 2008»
13 years 11 months ago
The Discrete Basis Problem
Matrix decomposition methods represent a data matrix as a product of two smaller matrices: one containing basis vectors that represent meaningful concepts in the data, and another ...
Pauli Miettinen, Taneli Mielikäinen, Aristide...
TKDE
2008
137views more  TKDE 2008»
13 years 11 months ago
GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks
Abstract-- In peer-to-peer (P2P) networks, reputation aggregation and peer ranking are the most time-consuming and spacedemanding operations. This paper proposes a gossip-based rep...
Runfang Zhou, Kai Hwang, Min Cai
TKDE
2008
126views more  TKDE 2008»
13 years 11 months ago
Mining Impact-Targeted Activity Patterns in Imbalanced Data
Longbing Cao, Yanchang Zhao, Chengqi Zhang
TKDE
2008
134views more  TKDE 2008»
13 years 11 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
TKDE
2008
115views more  TKDE 2008»
13 years 11 months ago
A Niching Memetic Algorithm for Simultaneous Clustering and Feature Selection
Clustering is inherently a difficult task and is made even more difficult when the selection of relevant features is also an issue. In this paper, we propose an approach for simult...
Weiguo Sheng, Xiaohui Liu, Michael C. Fairhurst
TKDE
2008
234views more  TKDE 2008»
13 years 11 months ago
Probabilistic Group Nearest Neighbor Queries in Uncertain Databases
The importance of query processing over uncertain data has recently arisen due to its wide usage in many real-world applications. In the context of uncertain databases, previous wo...
Xiang Lian, Lei Chen 0002
TKDE
2008
118views more  TKDE 2008»
13 years 11 months ago
Ranked Reverse Nearest Neighbor Search
Ken C. K. Lee, Baihua Zheng, Wang-Chien Lee