Sciweavers

69 search results - page 8 / 14
» Anonymizing Transaction Data by Integrating Suppression and ...
Sort
View
DATAMINE
2002
135views more  DATAMINE 2002»
14 years 9 months ago
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization
: Web usage mining, possibly used in conjunction with standard approaches to personalization such as collaborative filtering, can help address some of the shortcomings of these tec...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...
WWW
2002
ACM
15 years 10 months ago
Aliasing on the world wide web: prevalence and performance implications
Aliasing occurs in Web transactions when requests containing different URLs elicit replies containing identical data payloads. Conventional caches associate stored data with URLs ...
Terence Kelly, Jeffrey C. Mogul
WDAG
2005
Springer
104views Algorithms» more  WDAG 2005»
15 years 3 months ago
Polymorphic Contention Management
Abstract. In software transactional memory (STM) systems, a contention manager resolves conflicts among transactions accessing the same memory locations. Whereas atomicity and ser...
Rachid Guerraoui, Maurice Herlihy, Bastian Pochon
83
Voted
CIDR
2009
167views Algorithms» more  CIDR 2009»
14 years 10 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
PODS
2004
ACM
109views Database» more  PODS 2004»
15 years 9 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams