Sciweavers

1160 search results - page 232 / 232
» Applying Constraint Solving to the Management of Distributed...
Sort
View
CIT
2006
Springer
13 years 9 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
ATAL
2010
Springer
13 years 6 months ago
A model of normative power
A power describes the ability of an agent to act in some way. While this notion of power is critical in the context of organisational dynamics, and has been studied by others in t...
Nir Oren, Michael Luck, Simon Miles
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 5 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
CIKM
2011
Springer
12 years 5 months ago
Content based social behavior prediction: a multi-task learning approach
The study of information flow analyzes the principles and mechanisms of social information distribution. It is becoming an extremely important research topic in social network re...
Hongliang Fei, Ruoyi Jiang, Yuhao Yang, Bo Luo, Ju...
KDD
2009
ACM
204views Data Mining» more  KDD 2009»
14 years 5 months ago
Improving classification accuracy using automatically extracted training data
Classification is a core task in knowledge discovery and data mining, and there has been substantial research effort in developing sophisticated classification models. In a parall...
Ariel Fuxman, Anitha Kannan, Andrew B. Goldberg, R...