Sciweavers

444 search results - page 78 / 89
» Sensitive state-space exploration
Sort
View
KDD
2004
ACM
118views Data Mining» more  KDD 2004»
16 years 5 days ago
Parallel computation of high dimensional robust correlation and covariance matrices
The computation of covariance and correlation matrices are critical to many data mining applications and processes. Unfortunately the classical covariance and correlation matrices...
James Chilson, Raymond T. Ng, Alan Wagner, Ruben H...
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
16 years 2 days ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
VLDB
2007
ACM
187views Database» more  VLDB 2007»
15 years 12 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
15 years 12 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 6 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...