Sciweavers

2705 search results - page 480 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
129
Voted
EDBT
2009
ACM
277views Database» more  EDBT 2009»
15 years 6 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
121
Voted
JCST
2011
89views more  JCST 2011»
14 years 8 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
PERCOM
2005
ACM
16 years 1 months ago
Adaptive Temporal Radio Maps for Indoor Location Estimation
In this paper, we present a novel method to adapt the temporal radio maps for indoor location determination by offsetting the variational environmental factors using data mining t...
Jie Yin, Qiang Yang, Lionel M. Ni
BMCBI
2002
110views more  BMCBI 2002»
15 years 1 months ago
Identifying functional relationships among human genes by systematic analysis of biological literature
Background: The availability of biomedical literature in electronic format has made it possible to implement automatic text processing methods to expose implicit relationships amo...
Yong-Chuan Tao, Rudolph L. Leibel
JUCS
2002
231views more  JUCS 2002»
15 years 1 months ago
Efficient Content-Based and Metadata Retrieval in Image Database
: Managing image data in a database system using metadata has been practiced since the last two decades. However, describing an image fully and adequately with metadata is practica...
Solomon Atnafu, Richard Chbeir, Lionel Brunie