Sciweavers

1712 search results - page 66 / 343
» Abstract Constraint Data Types
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 14 days ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ADMA
2010
Springer
264views Data Mining» more  ADMA 2010»
14 years 9 months ago
Frequent Pattern Trend Analysis in Social Networks
Abstract. This paper describes an approach to identifying and comparing frequent pattern trends in social networks. A frequent pattern trend is defined as a sequence of time-stampe...
Puteri N. E. Nohuddin, Rob Christley, Frans Coenen...
SCM
2003
15 years 14 days ago
Uniform Comparison of Configuration Management Data Models
The data models of a series of 11 configuration management systems—of varying type and complexity—are represented using containment data models. Containment data models are a s...
E. James Whitehead Jr., Dorrit Gordon
DEXA
2004
Springer
131views Database» more  DEXA 2004»
15 years 4 months ago
Partially Ordered Preferences Applied to the Site Location Problem in Urban Planning
Abstract. This paper presents an application that aims at identifying optimal locations based on partially ordered constraints. It combines a tool developed in this project that al...
Sylvain Lagrue, Rodolphe Devillers, Jean-Yves Besq...
DASFAA
2009
IEEE
129views Database» more  DASFAA 2009»
15 years 6 months ago
Towards Preference-Constrained k-Anonymisation
Abstract. In this paper, we propose a novel preference-constrained approach to k-anonymisation. In contrast to the existing works on kanonymisation which attempt to satisfy a minim...
Grigorios Loukides, Achilles Tziatzios, Jianhua Sh...