Sciweavers

2702 search results - page 374 / 541
» Practically Applicable Formal Methods
Sort
View
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 4 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
125
Voted
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 9 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 3 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
118
Voted
EDBT
2006
ACM
174views Database» more  EDBT 2006»
16 years 2 months ago
Fast Computation of Reachability Labeling for Large Graphs
The need of processing graph reachability queries stems from many applications that manage complex data as graphs. The applications include transportation network, Internet traffic...
Jiefeng Cheng, Jeffrey Xu Yu, Xuemin Lin, Haixun W...
ICDE
2010
IEEE
568views Database» more  ICDE 2010»
16 years 2 months ago
Reverse Top-k Queries
Rank-aware query processing has become essential for many applications that return to the user only the top-k objects based on the individual user's preferences. Top-k queries...
Akrivi Vlachou, Christos Doulkeridis, Kjetil N&osl...