Sciweavers

5326 search results - page 1028 / 1066
» On what we can ensure
Sort
View
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
16 years 29 days ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
119
Voted
RECOMB
2005
Springer
16 years 26 days ago
Comparative Systems Biology of the Sporulation Initiation Network in Prokaryotes
Many years of experimental and computational molecular biology of model organisms such as Escherichia coli and Saccharomyces cerevisiae has elucidated the gene regulatory network i...
Michiel J. L. de Hoon, Dennis Vitkup
SIGMOD
2003
ACM
158views Database» more  SIGMOD 2003»
16 years 21 days ago
Processing Set Expressions over Continuous Update Streams
There is growing interest in algorithms for processing and querying continuous data streams (i.e., data that is seen only once in a fixed order) with limited memory resources. In ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
SIGMOD
2002
ACM
181views Database» more  SIGMOD 2002»
16 years 21 days ago
Archiving scientific data
This report is part of the seminar Digital Information Curation held by Prof. Dr. Marc H. Scholl and Dr. Andr?e Seifert during the winter term 2005/06. Its intention is to summari...
Peter Buneman, Sanjeev Khanna, Keishi Tajima, Wang...
102
Voted
EDBT
2004
ACM
131views Database» more  EDBT 2004»
16 years 20 days ago
A Framework for Access Methods for Versioned Data
This paper presents a framework for understanding and constructing access methods for versioned data. Records are associated with version ranges in a version tree. A minimal repre...
Betty Salzberg, Linan Jiang, David B. Lomet, Manue...
« Prev « First page 1028 / 1066 Last » Next »