Sciweavers

160 search results - page 31 / 32
» Analyzing the Terrorist Social Networks with Visualization T...
Sort
View
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 1 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
116
Voted
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 21 days ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
139
Voted
SI3D
1992
ACM
15 years 2 months ago
Interactive Volume Rendering on a Multicomputer
Direct volume rendering is a computationally intensive operation that has become a valued and often preferred visualization tool. For maximal data comprehension, interactive manip...
Ulrich Neumann
114
Voted
BMCBI
2011
14 years 1 months ago
MINE: Module Identification in NEtworks
Background: Graphical models of network associations are useful for both visualizing and integrating multiple types of association data. Identifying modules, or groups of function...
Kahn Rhrissorrakrai, Kristin C. Gunsalus
82
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...