Sciweavers

20024 search results - page 3535 / 4005
» Database Management Systems
Sort
View
154
Voted
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
16 years 5 months ago
On compressing social networks
Motivated by structural properties of the Web graph that support efficient data structures for in memory adjacency queries, we study the extent to which a large network can be com...
Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, ...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 5 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
16 years 5 months ago
Data Mining for Typhoon Image Collection
This paper introduces the application of data mining methods to the analysis and prediction of the typhoon. The testbed for this research is the typhoon image collection that we e...
Asanobu Kitamoto
CHI
2006
ACM
16 years 5 months ago
Verbosity: a game for collecting common-sense facts
We address the problem of collecting a database of "common-sense facts" using a computer game. Informally, a common-sense fact is a true statement about the world that i...
Luis von Ahn, Mihir Kedia, Manuel Blum
HPCA
2005
IEEE
16 years 5 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
« Prev « First page 3535 / 4005 Last » Next »