Sciweavers

1701 search results - page 334 / 341
» Providing k-anonymity in data mining
Sort
View
84
Voted
ESWA
2008
219views more  ESWA 2008»
14 years 9 months ago
Business intelligence approach to supporting strategy-making of ISP service management
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan's ISP i...
Sheng-Tun Li, Li-Yen Shue, Shu-Fen Lee
75
Voted
WWW
2009
ACM
15 years 10 months ago
Click chain model in web search
Given a terabyte click log, can we build an efficient and effective click model? It is commonly believed that web search click logs are a gold mine for search business, because th...
Anitha Kannan, Chao Liu 0001, Christos Faloutsos, ...
MMDB
2004
ACM
148views Multimedia» more  MMDB 2004»
15 years 3 months ago
A unified framework for image database clustering and content-based retrieval
With the proliferation of image data, the need to search and retrieve images efficiently and accurately from a large image database or a collection of image databases has drastica...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
COOPIS
2002
IEEE
15 years 2 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
AIPS
2003
14 years 11 months ago
A Multi-Agent System-driven AI Planning Approach to Biological Pathway Discovery
As genomic and proteomic data is collected from highthroughput methods on a daily basis, subcellular components are identified and their in vitro behavior is characterized. Howev...
Salim Khan, William Gillis, Carl Schmidt, Keith De...