Sciweavers

10670 search results - page 30 / 2134
» Required Information Release
Sort
View
ISSTA
2004
ACM
15 years 2 months ago
Where the bugs are
The ability to predict which files in a large software system are most likely to contain the largest numbers of faults in the next release can be a very valuable asset. To accomp...
Thomas J. Ostrand, Elaine J. Weyuker, Robert M. Be...
NAR
2011
251views Computer Vision» more  NAR 2011»
14 years 4 months ago
The IMGT/HLA database
The IMGT/HLA database (http://www.ebi.ac.uk/imgt/ hla) has provided a centralized repository for the sequences of the alleles named by the WHO Nomenclature Committee for Factors o...
James Robinson, Kavita Mistry, Hamish McWilliam, R...
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
15 years 1 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
15 years 3 months ago
Advanced Metadata for Privacy-Aware Representation of Credentials
Semantic Web languages like OWL and RDFS promise to be viable means for representing metadata describing users and resources available over the Internet. Recently, interest has be...
Paolo Ceravolo, Ernesto Damiani, Sabrina De Capita...
ACSC
2009
IEEE
15 years 4 months ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li