Sciweavers

1160 search results - page 223 / 232
» Applying Constraint Solving to the Management of Distributed...
Sort
View
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
16 years 2 days ago
Extracting key-substring-group features for text classification
In many text classification applications, it is appealing to take every document as a string of characters rather than a bag of words. Previous research studies in this area mostl...
Dell Zhang, Wee Sun Lee
ADC
2003
Springer
106views Database» more  ADC 2003»
15 years 4 months ago
Database Component Ware
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, con...
Bernhard Thalheim
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
16 years 2 days ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
KDD
2004
ACM
209views Data Mining» more  KDD 2004»
16 years 2 days ago
Tracking dynamics of topic trends using a finite mixture model
In a wide range of business areas dealing with text data streams, including CRM, knowledge management, and Web monitoring services, it is an important issue to discover topic tren...
Satoshi Morinaga, Kenji Yamanishi
VEE
2009
ACM
240views Virtualization» more  VEE 2009»
15 years 6 months ago
Memory buddies: exploiting page sharing for smart colocation in virtualized data centers
Many data center virtualization solutions, such as VMware ESX, employ content-based page sharing to consolidate the resources of multiple servers. Page sharing identifies virtual...
Timothy Wood, Gabriel Tarasuk-Levin, Prashant J. S...