Sciweavers

586 search results - page 67 / 118
» Adding Structure to Unstructured Data
Sort
View
115
Voted
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 7 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
101
Voted
INFOVIS
1999
IEEE
15 years 4 months ago
Domain Analysis: A Technique to Design a User-Centered Visualization Framework
Domain Analysis for Data Visualization (DADV) is a technique to use when investigating a domain where data visualizations are going to be designed and added to existing software s...
Octavio Juarez Espinosa, Chris Hendrickson, James ...
93
Voted
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
15 years 5 months ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
102
Voted
SIGIR
2008
ACM
15 years 13 days ago
Crosslingual location search
Address geocoding, the process of finding the map location for a structured postal address, is a relatively well-studied problem. In this paper we consider the more general proble...
Tanuja Joshi, Joseph Joy, Tobias Kellner, Udayan K...
119
Voted
JODL
2000
123views more  JODL 2000»
15 years 9 days ago
On Z39.50 wrapping and description logics
Z39.50 is a client/server protocol widely used in digital libraries and museums for searching and retrieving information spread over a number of heterogeneous sources. To overcome ...
Yannis Velegrakis, Vassilis Christophides, Panos C...