Sciweavers

2977 search results - page 389 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 2 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
KDD
2003
ACM
135views Data Mining» more  KDD 2003»
16 years 2 months ago
Efficiently handling feature redundancy in high-dimensional data
High-dimensional data poses a severe challenge for data mining. Feature selection is a frequently used technique in preprocessing high-dimensional data for successful data mining....
Lei Yu, Huan Liu
KDD
2002
ACM
154views Data Mining» more  KDD 2002»
16 years 2 months ago
Mining Protein Contact Maps
The 3D conformation of a protein may be compactly represented in a symmetrical, square, boolean matrix of pairwise, inter-residue contacts, or "contact map". The contact...
Jingjing Hu, Xiaolan Shen, Yu Shao, Chris Bystroff...
CHI
2007
ACM
16 years 2 months ago
Pictures at the ATM: exploring the usability of multiple graphical passwords
Users gain access to cash, confidential information and services at Automated Teller Machines (ATMs) via an authentication process involving a Personal Identification Number (PIN)...
Wendy Moncur, Grégory Leplâtre
CHI
2007
ACM
16 years 2 months ago
Journey planning based on user needs
In this paper we discuss potential developments to the design of pre-trip in-home journey planning services, to include support for additional user needs. These needs were identif...
Alisdair Owens, Daniel A. Smith, Max Wilson, Paul ...