Sciweavers

5758 search results - page 146 / 1152
» Anonymity-preserving data collection
Sort
View
75
Voted
POLICY
2007
Springer
15 years 7 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...
75
Voted
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 6 months ago
Plagiarism Detection in arXiv
We describe a large-scale application of methods for finding plagiarism and self-plagiarism in research document collections. The methods are applied to a collection of 284,834 d...
Daria Sorokina, Johannes Gehrke, Simeon Warner, Pa...
ECRA
2006
164views more  ECRA 2006»
15 years 25 days ago
Comparison of product bundling strategies on different online shopping behaviors
Bundling is a very popular sales-promotion tool, in which a critical issue is to decide what products should be sold together in order to improve sales. Traditionally, this decisi...
Tzyy-Ching Yang, Hsiangchu Lai
109
Voted
DMS
2010
184views Multimedia» more  DMS 2010»
14 years 11 months ago
Building Topic/Trend Detection System based on Slow Intelligence
—It becomes an interesting research topic to detect trend in the Internet era, where millions of data are posted online everyday. As social media, for example, blogs, forums, and...
Chia Chun Shih, Ting-Chun Peng
HICSS
2000
IEEE
121views Biometrics» more  HICSS 2000»
15 years 5 months ago
Combining Data from Existing Company Data Sources: Architecture and Experiences
Combining and utilizing data from different sources is a common problem in many companies today. Useful data can be found in various applications, such as spreadsheets, project ma...
Jari Vanhanen, Kai Risku, Pekka Kilponen