Sciweavers

1035 search results - page 122 / 207
» Cluster validation using information stability measures
Sort
View
EDBT
2008
ACM
154views Database» more  EDBT 2008»
15 years 10 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
EDM
2010
248views Data Mining» more  EDM 2010»
14 years 11 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...
ICASSP
2011
IEEE
14 years 1 months ago
Practical limits in RSS-based positioning
Received signal strength (RSS) based source localization papers often ignore the practical effects of range limits in the measurements. In many devices, this results in some senso...
Richard K. Martin, Amanda Sue King, Ryan W. Thomas...
EUROSYS
2006
ACM
15 years 7 months ago
Database replication policies for dynamic content applications
The database tier of dynamic content servers at large Internet sites is typically hosted on centralized and expensive hardware. Recently, research prototypes have proposed using d...
Gokul Soundararajan, Cristiana Amza, Ashvin Goel
ICDIM
2007
IEEE
15 years 4 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...