Sciweavers

191 search results - page 31 / 39
» On Effective Data Clustering in Bitemporal Databases
Sort
View
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 3 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 19 days ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
SSDBM
2005
IEEE
128views Database» more  SSDBM 2005»
15 years 4 months ago
Fuzzy Decomposition of Spatially Extended Objects
Modern database applications including computer-aided design, multimedia information systems, medical imaging, molecular biology, or geographical information systems impose new re...
Hans-Peter Kriegel, Martin Pfeifle
EDBT
2012
ACM
291views Database» more  EDBT 2012»
13 years 1 months ago
Relevance search in heterogeneous networks
Conventional research on similarity search focuses on measuring the similarity between objects with the same type. However, in many real-world applications, we need to measure the...
Chuan Shi, Xiangnan Kong, Philip S. Yu, Sihong Xie...
CIKM
2008
Springer
15 years 1 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...