Sciweavers

4051 search results - page 375 / 811
» Aggregation
Sort
View
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
15 years 11 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
15 years 11 months ago
Seaweed: Distributed Scalable Ad Hoc Querying
Many emerging applications such as wide-area network management need to query large, structured, highly distributed datasets. Seaweed is a distributed scalable infrastructure for ...
Richard Mortier, Dushyanth Narayanan, Austin Donne...
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
15 years 11 months ago
Dealing with Overload in Distributed Stream Processing Systems
Overload management has been an important problem for large-scale dynamic systems. In this paper, we study this problem in the context of our Borealis distributed stream processin...
Nesime Tatbul, Stanley B. Zdonik
ICDM
2006
IEEE
161views Data Mining» more  ICDM 2006»
15 years 11 months ago
Personalization in Context: Does Context Matter When Building Personalized Customer Models?
The idea that context is important when predicting customer behavior has been maintained by scholars in marketing and data mining. However, no systematic study measuring how much ...
Michele Gorgoglione, Cosimo Palmisano, Alexander T...
ICMCS
2006
IEEE
117views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Offering Differentiated Services in Peer-to-Peer Multimedia Multicast
In traditional overlay multicast network, all peers are treated as equal regardless of their importance and contribution to the network. In this paper, we consider that each user ...
Kan-Leung Cheng, Xing Jin, S.-H. Gary Chan