Sciweavers

13476 search results - page 2559 / 2696
» Learning from Streams
Sort
View
152
Voted
PODS
2003
ACM
156views Database» more  PODS 2003»
16 years 4 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
128
Voted
ICDE
2010
IEEE
263views Database» more  ICDE 2010»
16 years 3 months ago
Managing Uncertainty of XML Schema Matching
Abstract-- Despite of advances in machine learning technologies, a schema matching result between two database schemas (e.g., those derived from COMA++) is likely to be imprecise. ...
Reynold Cheng, Jian Gong, David W. Cheung
MOBISYS
2008
ACM
16 years 3 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
128
Voted
TCC
2010
Springer
169views Cryptology» more  TCC 2010»
16 years 25 days ago
On Complete Primitives for Fairness
Abstract. For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for...
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostr...
180
Voted
IUI
2010
ACM
16 years 25 days ago
Personalized news recommendation based on click behavior
Online news reading has become very popular as the web provides access to news articles from millions of sources around the world. A key challenge of news websites is to help user...
Jiahui Liu, Peter Dolan, Elin Rønby Pederse...
« Prev « First page 2559 / 2696 Last » Next »