Sciweavers

7006 search results - page 1304 / 1402
» Approximation Algorithms
Sort
View
104
Voted
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 1 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
104
Voted
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 1 months ago
Unsupervised learning on k-partite graphs
Various data mining applications involve data objects of multiple types that are related to each other, which can be naturally formulated as a k-partite graph. However, the resear...
Bo Long, Xiaoyun Wu, Zhongfei (Mark) Zhang, Philip...
102
Voted
STOC
2005
ACM
135views Algorithms» more  STOC 2005»
16 years 1 months ago
On the bias of traceroute sampling: or, power-law degree distributions in regular graphs
Understanding the graph structure of the Internet is a crucial step for building accurate network models and designing efficient algorithms for Internet applications. Yet, obtaini...
Dimitris Achlioptas, Aaron Clauset, David Kempe, C...
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
16 years 29 days ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
172
Voted
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
16 years 29 days ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
« Prev « First page 1304 / 1402 Last » Next »