Sciweavers

137 search results - page 16 / 28
» Hiding informative association rule sets
Sort
View
SIGIR
2008
ACM
14 years 9 months ago
Social tag prediction
In this paper, we look at the "social tag prediction" problem. Given a set of objects, and a set of tags applied to those objects by users, can we predict whether a give...
Paul Heymann, Daniel Ramage, Hector Garcia-Molina
CIKM
2005
Springer
15 years 3 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
JMM2
2008
103views more  JMM2 2008»
14 years 9 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
74
Voted
RIDE
2003
IEEE
15 years 2 months ago
Event Information Extraction Using Link Grammar
In this paper, we present a scheme for identifying instances of events and extracting information about them. The scheme can handle all events with which an action can be associat...
Harsha V. Madhyastha, N. Balakrishnan, K. R. Ramak...
ECIS
2004
14 years 11 months ago
The challenge of translating health information systems from one developing country context to another: case study from Mozambiq
What does it take for an open source, Not-for-Profit, software developed in one context to be internationalized and localized so as to be used in another context different from it...
José Leopoldo Nhampossa