Sciweavers

422 search results - page 79 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
TITB
2008
204views more  TITB 2008»
14 years 9 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
AND
2009
14 years 8 months ago
Discovering voter preferences in blogs using mixtures of topic models
In this paper we propose a new approach to capture the inclination towards a certain election candidate from the contents of blogs and to explain why that inclination may be so. T...
Pradipto Das, Rohini K. Srihari, Smruthi Mukund
80
Voted
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 1 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
PERVASIVE
2011
Springer
14 years 28 days ago
NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems
Abstract. Accurate and fine-grained prediction of future user location and geographical profile has interesting and promising applications including targeted content service, adv...
Salvatore Scellato, Mirco Musolesi, Cecilia Mascol...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 16 days ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...