Sciweavers

137 search results - page 17 / 28
» Hiding informative association rule sets
Sort
View
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 7 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
DEXA
2000
Springer
102views Database» more  DEXA 2000»
15 years 1 months ago
Extending the Re-use of Query Results at Remote Client Sites
In 'Associative Caching' each client computer keeps a copy of its query result sets in its own local database. The purpose is to reduce the size and frequency of queries ...
Jerome Robinson, Barry G. T. Lowden
PADL
2000
Springer
15 years 1 months ago
Calculating a New Data Mining Algorithm for Market Basket Analysis
The general goal of data mining is to extract interesting correlated information from large collection of data. A key computationally-intensive subproblem of data mining involves ...
Zhenjiang Hu, Wei-Ngan Chin, Masato Takeichi
IQIS
2004
ACM
15 years 3 months ago
Mining for Patterns in Contradictory Data
Information integration is often faced with the problem that different data sources represent the same set of the real-world objects, but give conflicting values for specific prop...
Heiko Müller, Ulf Leser, Johann Christoph Fre...
PPL
2008
88views more  PPL 2008»
14 years 9 months ago
Evaluating Computational Costs while Handling Data and Control Parallelism
The aim of this work is to introduce a computational costs system associated to a semantic framework for orthogonal data and control parallelism handling. In such a framework a pa...
Sonia Campa