Sciweavers

1989 search results - page 279 / 398
» A framework for testing database applications
Sort
View
176
Voted
EDBT
2004
ACM
234views Database» more  EDBT 2004»
16 years 4 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
EDBTW
2010
Springer
15 years 10 months ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
137
Voted
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
15 years 10 months ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
CIKM
2009
Springer
15 years 10 months ago
ASIC: algebra-based structural index comparison
Structural indices play a significant role in improving the efficiency of XML query evaluation. Being able to compare various structural indexing techniques is critical for a DBM...
Yuqing Wu, Sofia Brenes, Tejas Totade, Shijin Josh...
RECSYS
2009
ACM
15 years 10 months ago
TagiCoFi: tag informed collaborative filtering
Besides the rating information, an increasing number of modern recommender systems also allow the users to add personalized tags to the items. Such tagging information may provide...
Yi Zhen, Wu-Jun Li, Dit-Yan Yeung