Sciweavers

1298 search results - page 145 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 3 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
133
Voted
IUI
2011
ACM
14 years 6 months ago
Automatically generating stories from sensor data
Recent research in Augmented and Alternative Communication (AAC) has begun to make use of Natural Language Generation (NLG) techniques. This creates an opportunity for constructin...
Joseph Reddington, Nava Tintarev
124
Voted
CSB
2003
IEEE
128views Bioinformatics» more  CSB 2003»
15 years 9 months ago
Degenerate Primer Design via Clustering
This paper describes a new strategy for designing degenerate primers for a given multiple alignment of amino acid sequences. Degenerate primers are useful for amplifying homologou...
Xintao Wei, David N. Kuhn, Giri Narasimhan
118
Voted
SSDBM
2010
IEEE
105views Database» more  SSDBM 2010»
15 years 8 months ago
Organization of Data in Non-convex Spatial Domains
We present a technique for organizing data in spatial databases with non-convex domains based on an automatic characterization using the medial-axis transform (MAT). We define a t...
Eric A. Perlman, Randal C. Burns, Michael M. Kazhd...
122
Voted
CLUSTER
2004
IEEE
15 years 7 months ago
An efficient end-host architecture for cluster communication
Cluster computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. Likewise, middleware te...
Xin Qi, Gabriel Parmer, Richard West