Sciweavers

210 search results - page 28 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
HVEI
2010
15 years 1 months ago
Tradeoffs in subjective testing methods for image and video quality assessment
An objective quality estimator for either still images or video should accurately estimate the perceived quality scores of a collection of stimuli. New applications and processing...
David M. Rouse, Romuald Pépion, Patrick Le ...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 6 days ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
AGENTS
2001
Springer
15 years 4 months ago
A multi-agent system for automated genomic annotation
Massive amounts of raw data are currently being generated by biologists while sequencing organisms. Outside of the largest, high-pro le projects such as the Human Genome Project, ...
Keith Decker, Xiaojing Zheng, Carl Schmidt
81
Voted
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
16 years 2 days ago
Clustering pair-wise dissimilarity data into partially ordered sets
Ontologies represent data relationships as hierarchies of possibly overlapping classes. Ontologies are closely related to clustering hierarchies, and in this article we explore th...
Jinze Liu, Qi Zhang, Wei Wang 0010, Leonard McMill...
AMAST
2004
Springer
15 years 5 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns