Sciweavers

3651 search results - page 593 / 731
» Data Mining for Security Applications
Sort
View
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 3 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
113
Voted
MOBIHOC
2005
ACM
16 years 12 days ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
116
Voted
CIKM
2007
Springer
15 years 7 months ago
Top-k subgraph matching query in a large graph
Recently, due to its wide applications, subgraph search has attracted a lot of attention from database and data mining community. Sub-graph search is defined as follows: given a ...
Lei Zou, Lei Chen 0002, Yansheng Lu
107
Voted
BMCBI
2007
171views more  BMCBI 2007»
15 years 28 days ago
An open source infrastructure for managing knowledge and finding potential collaborators in a domain-specific subset of PubMed,
Background: Identifying relevant research in an ever-growing body of published literature is becoming increasingly difficult. Establishing domain-specific knowledge bases may be a...
Wei Yu, Ajay Yesupriya, Anja Wulf, Junfeng Qu, Mui...
DASFAA
2004
IEEE
135views Database» more  DASFAA 2004»
15 years 4 months ago
Semi-supervised Text Classification Using Partitioned EM
Text classification using a small labeled set and a large unlabeled data is seen as a promising technique to reduce the labor-intensive and time consuming effort of labeling traini...
Gao Cong, Wee Sun Lee, Haoran Wu, Bing Liu