Sciweavers

167 search results - page 6 / 34
» Mining networks with shared items
Sort
View
ICDM
2008
IEEE
95views Data Mining» more  ICDM 2008»
15 years 4 months ago
Publishing Sensitive Transactions for Itemset Utility
We consider the problem of publishing sensitive transaction data with privacy preservation. High dimensionality of transaction data poses unique challenges on data privacy and dat...
Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Che...
CCGRID
2003
IEEE
15 years 2 months ago
Peer-to-Peer Keyword Search Using Keyword Relationship
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...
Kiyohide Nakauchi, Yuichi Ishikawa, Hiroyuki Morik...
SEMWEB
2005
Springer
15 years 3 months ago
Semantically Rich Recommendations in Social Networks for Sharing, Exchanging and Ranking Semantic Context
Recommender algorithms have been quite successfully employed in a variety of scenarios from filtering applications to recommendations of movies and books at Amazon.com. However, a...
Stefania Ghita, Wolfgang Nejdl, Raluca Paiu
RECSYS
2009
ACM
15 years 4 months ago
Using a trust network to improve top-N recommendation
Top-N item recommendation is one of the important tasks of recommenders. Collaborative filtering is the most popular approach to building recommender systems which can predict ra...
Mohsen Jamali, Martin Ester
99
Voted
TPDS
1998
122views more  TPDS 1998»
14 years 9 months ago
Managing Statistical Behavior of Large Data Sets in Shared-Nothing Architectures
—Increasingly larger data sets are being stored in networked architectures. Many of the available data structures are not easily amenable to parallel realizations. Hashing scheme...
Isidore Rigoutsos, Alex Delis