Sciweavers

191 search results - page 31 / 39
» On Effective Data Clustering in Bitemporal Databases
Sort
View
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 5 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 2 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
SSDBM
2005
IEEE
128views Database» more  SSDBM 2005»
15 years 7 months ago
Fuzzy Decomposition of Spatially Extended Objects
Modern database applications including computer-aided design, multimedia information systems, medical imaging, molecular biology, or geographical information systems impose new re...
Hans-Peter Kriegel, Martin Pfeifle
EDBT
2012
ACM
291views Database» more  EDBT 2012»
13 years 3 months ago
Relevance search in heterogeneous networks
Conventional research on similarity search focuses on measuring the similarity between objects with the same type. However, in many real-world applications, we need to measure the...
Chuan Shi, Xiangnan Kong, Philip S. Yu, Sihong Xie...
CIKM
2008
Springer
15 years 3 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...