Sciweavers

13822 search results - page 2592 / 2765
» Models in Knowledge Management
Sort
View
143
Voted
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
16 years 4 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King
119
Voted
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
16 years 4 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
STOC
2004
ACM
107views Algorithms» more  STOC 2004»
16 years 4 months ago
Primal-dual algorithms for deterministic inventory problems
We consider several classical models in deterministic inventory theory: the single-item lot-sizing problem, the joint replenishment problem, and the multi-stage assembly problem. ...
Retsef Levi, Robin Roundy, David B. Shmoys
OSDI
2006
ACM
16 years 4 months ago
CRAMM: Virtual Memory Support for Garbage-Collected Applications
Existing virtual memory systems usually work well with applications written in C and C++, but they do not provide adequate support for garbage-collected applications. The performa...
Ting Yang, Emery D. Berger, Scott F. Kaplan, J. El...
241
Voted
VLDB
2008
ACM
148views Database» more  VLDB 2008»
16 years 4 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
« Prev « First page 2592 / 2765 Last » Next »