Sciweavers

242 search results - page 48 / 49
» ARMOR: Association Rule Mining based on ORacle
Sort
View
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
14 years 6 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
FPL
2005
Springer
119views Hardware» more  FPL 2005»
13 years 12 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
HPCC
2007
Springer
14 years 17 days ago
A Data Imputation Model in Sensor Databases
Data missing is a common problem in database query processing, which can cause bias or lead to inefficient analyses, and this problem happens more often in sensor databases. The re...
Nan Jiang
MM
2004
ACM
173views Multimedia» more  MM 2004»
13 years 12 months ago
Cortina: a system for large-scale, content-based web image retrieval
Recent advances in processing and networking capabilities of computers have led to an accumulation of immense amounts of multimedia data such as images. One of the largest reposit...
Till Quack, Ullrich Mönich, Lars Thiele, B. S...
ACSC
2008
IEEE
13 years 8 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such a...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank