Sciweavers

2705 search results - page 462 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
WISE
2002
Springer
15 years 6 months ago
An Update-Risk Based Approach to TTL Estimation in Web Caching
Web caching is an important technique for accelerating web applications and reducing the load on the web server and the network through local cache accesses. As in the traditional...
Jeong-Joon Lee, Kyu-Young Whang, Byung Suk Lee, Ji...
ICCBR
2001
Springer
15 years 6 months ago
A Fuzzy-Rough Approach for Case Base Maintenance
Abstract. This paper proposes a fuzzy-rough method of maintaining CaseBased Reasoning (CBR) systems. The methodology is mainly based on the idea that a large case library can be tr...
Guoqing Cao, Simon C. K. Shiu, Xizhao Wang
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný
VLDB
2007
ACM
121views Database» more  VLDB 2007»
16 years 2 months ago
Ranked Subsequence Matching in Time-Series Databases
Existing work on similar sequence matching has focused on either whole matching or range subsequence matching. In this paper, we present novel methods for ranked subsequence match...
Wook-Shin Han, Jinsoo Lee, Yang-Sae Moon, Haifeng ...
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
14 years 12 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos