Sciweavers

24529 search results - page 351 / 4906
» Computing on Authenticated Data
Sort
View
ICDE
2006
IEEE
124views Database» more  ICDE 2006»
16 years 5 months ago
C-Cubing: Efficient Computation of Closed Cubes by Aggregation-Based Checking
It is well recognized that data cubing often produces huge outputs. Two popular efforts devoted to this problem are (1) iceberg cube, where only significant cells are kept, and (2...
Dong Xin, Zheng Shao, Jiawei Han, Hongyan Liu
CIBCB
2006
IEEE
15 years 10 months ago
A Systematic Computational Approach for Transcription Factor Target Gene Prediction
— Computational prediction of transcription factor’s binding sites and regulatory target genes has great value to the biological studies of cellular process. Existing practices...
Ji He, Xinbin Dai, Xuechun Zhao
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
15 years 11 months ago
Finding Associations and Computing Similarity via Biased Pair Sampling
Sampling-based methods have previously been proposed for the problem of finding interesting associations in data, even for low-support items. While these methods do not guarantee ...
Andrea Campagna, Rasmus Pagh
GBRPR
2009
Springer
15 years 11 months ago
On Computing Canonical Subsets of Graph-Based Behavioral Representations
The collection of behavior protocols is a common practice in human factors research, but the analysis of these large data sets has always been a tedious and time-consuming process....
Walter C. Mankowski, Peter Bogunovich, Ali Shokouf...
115
Voted
EDOC
2006
IEEE
15 years 10 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman