Sciweavers

6906 search results - page 1320 / 1382
» An algorithm for modelling key terms
Sort
View
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
15 years 10 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 10 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
15 years 10 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SIGMOD
2008
ACM
107views Database» more  SIGMOD 2008»
15 years 10 months ago
Outlier-robust clustering using independent components
How can we efficiently find a clustering, i.e. a concise description of the cluster structure, of a given data set which contains an unknown number of clusters of different shape ...
Christian Böhm, Christos Faloutsos, Claudia P...
SIGMOD
2007
ACM
192views Database» more  SIGMOD 2007»
15 years 10 months ago
Benchmarking declarative approximate selection predicates
Declarative data quality has been an active research topic. The fundamental principle behind a declarative approach to data quality is the use of declarative statements to realize...
Amit Chandel, Oktie Hassanzadeh, Nick Koudas, Moha...
« Prev « First page 1320 / 1382 Last » Next »