Sciweavers

1890 search results - page 282 / 378
» Querying Big Data by Accessing Small Data
Sort
View
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
15 years 11 months ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
CCS
2009
ACM
15 years 6 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
ICSE
2005
IEEE-ACM
15 years 11 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
WWW
2007
ACM
15 years 12 months ago
Multi-factor clustering for a marketplace search interface
Search engines provide a small window to the vast repository of data they index and against which they search. They try their best to return the documents that are of relevance to...
Neel Sundaresan, Kavita Ganesan, Roopnath Grandhi
EWSN
2004
Springer
15 years 10 months ago
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation
The efficient subdivision of a sensor network into uniform, mostly non-overlapping clusters of physically close nodes is an important building block in the design of efficient uppe...
Haowen Chan, Adrian Perrig