Sciweavers

128 search results - page 21 / 26
» A random walk approach to sampling hidden databases
Sort
View
KDD
2008
ACM
259views Data Mining» more  KDD 2008»
15 years 10 months ago
Using ghost edges for classification in sparsely labeled networks
We address the problem of classification in partially labeled networks (a.k.a. within-network classification) where observed class labels are sparse. Techniques for statistical re...
Brian Gallagher, Hanghang Tong, Tina Eliassi-Rad, ...
83
Voted
EDBT
2009
ACM
164views Database» more  EDBT 2009»
15 years 1 months ago
Efficient identification of starters and followers in social media
Activity and user engagement in social media such as web logs, wikis, online forums or social networks has been increasing at unprecedented rates. In relation to social behavior i...
Michael Mathioudakis, Nick Koudas
CRYPTO
2012
Springer
241views Cryptology» more  CRYPTO 2012»
13 years 1 days ago
Crowd-Blending Privacy
We introduce a new definition of privacy called crowd-blending privacy that strictly relaxes the notion of differential privacy. Roughly speaking, k-crowd blending private saniti...
Johannes Gehrke, Michael Hay, Edward Lui, Rafael P...
TSMC
2010
14 years 4 months ago
Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition
Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the ...
Emanuele Maiorana, Patrizio Campisi, Julian Fi&eac...
75
Voted
PODS
2006
ACM
134views Database» more  PODS 2006»
15 years 9 months ago
Approximate quantiles and the order of the stream
Recently, there has been an increased focus on modeling uncertainty by distributions. Suppose we wish to compute a function of a stream whose elements are samples drawn independen...
Sudipto Guha, Andrew McGregor