Sciweavers

7433 search results - page 1418 / 1487
» Management of Technology
Sort
View
CIKM
2009
Springer
15 years 12 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
CIKM
2009
Springer
15 years 12 months ago
Scalable learning of collective behavior based on sparse social dimensions
The study of collective behavior is to understand how individuals behave in a social network environment. Oceans of data generated by social media like Facebook, Twitter, Flickr a...
Lei Tang, Huan Liu
CIKM
2009
Springer
15 years 12 months ago
L2 norm regularized feature kernel regression for graph data
Features in many real world applications such as Cheminformatics, Bioinformatics and Information Retrieval have complex internal structure. For example, frequent patterns mined fr...
Hongliang Fei, Jun Huan
CIKM
2009
Springer
15 years 12 months ago
MagicCube: choosing the best snippet for each aspect of an entity
Wikis are currently used in business to provide knowledge management systems, especially for individual organizations. However, building wikis manually is a laborious and time-con...
Yexin Wang, Li Zhao, Yan Zhang
CIKM
2009
Springer
15 years 12 months ago
Potential collaboration discovery using document clustering and community structure detection
Complex network analysis is a growing research area in a wide variety of domains and has recently become closely associated with data, text and web mining. One of the most active ...
Cristian Klen dos Santos, Alexandre Evsukoff, Beat...
« Prev « First page 1418 / 1487 Last » Next »