Sciweavers

1615 search results - page 130 / 323
» Computer science and decision theory
Sort
View
DIS
2008
Springer
15 years 2 months ago
Constructing Iceberg Lattices from Frequent Closures Using Generators
Frequent closures (FCIs) and generators (FGs) as well as the precedence relation on FCIs are key components in the definition of a variety of association rule bases. Although their...
Laszlo Szathmary, Petko Valtchev, Amedeo Napoli, R...
91
Voted
CHI
2004
ACM
16 years 1 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
215
Voted
POPL
2008
ACM
16 years 1 months ago
Systems biology, models, and concurrency
Models will play a central role in the representation, storage, manipulation, and communication of knowledge in systems biology. Models capable of fulfilling such a role will like...
Walter Fontana
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 6 months ago
MOBICHARTS: A Notation to Specify Mobile Computing Applications
A standard notation, that unambiguously expresses different aspects of a system, is important to the process of software development. The expressiveness of a standard notation hel...
Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyam...
80
Voted
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 10 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han