Sciweavers

1701 search results - page 131 / 341
» Providing k-anonymity in data mining
Sort
View
EDBT
2006
ACM
143views Database» more  EDBT 2006»
15 years 10 months ago
XG: A Grid-Enabled Query Processing Engine
In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...
SIGKDD
2010
126views more  SIGKDD 2010»
14 years 4 months ago
MultiClust 2010: discovering, summarizing and using multiple clusterings
Traditional clustering focuses on finding a single best clustering solution from data. However, given a single data set, one could interpret it in different ways. This is particul...
Xiaoli Z. Fern, Ian Davidson, Jennifer G. Dy
ICRA
2005
IEEE
106views Robotics» more  ICRA 2005»
15 years 3 months ago
Towards Topological Exploration of Abandoned Mines
— The need for reliable maps of subterranean spaces too hazardous for humans to occupy has motivated the use of robotic technology as mapping tools. As such, we present a systemi...
Aaron Morris, David Silver, David I. Ferguson, Sco...
KES
2005
Springer
15 years 3 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
WIDM
1999
ACM
15 years 2 months ago
Warehousing and Mining Web Logs
Analyzing Web Logs for usage and access trends can not only provide important information to web site developers and administrators, but also help in creating adaptive web sites. ...
Karuna P. Joshi, Anupam Joshi, Yelena Yesha, Raghu...