Sciweavers

7163 search results - page 1411 / 1433
» Privacy-Preserving Data Mining
Sort
View
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 21 days ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
ICDE
1998
IEEE
108views Database» more  ICDE 1998»
16 years 20 days ago
Efficient Discovery of Functional and Approximate Dependencies Using Partitions
Discovery of functionaldependencies from relations has been identified as an important database analysis technique. In this paper, we present a new approach for finding functional...
Ykä Huhtala, Juha Kärkkäinen, Pasi ...
GIS
2008
ACM
16 years 12 days ago
Qualitative geocoding of persistent web pages
Information and specifically Web pages may be organized, indexed, searched, and navigated using various metadata aspects, such as keywords, categories (themes), and also space. Wh...
Albert Angel, Chara Lontou, Dieter Pfoser, Alexand...
WWW
2009
ACM
16 years 2 hour ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...
WWW
2009
ACM
16 years 2 hour ago
Community gravity: measuring bidirectional effects by trust and rating on online social networks
Several attempts have been made to analyze customer behavior on online E-commerce sites. Some studies particularly emphasize the social networks of customers. Users' reviews ...
Yutaka Matsuo, Hikaru Yamamoto
« Prev « First page 1411 / 1433 Last » Next »