Sciweavers

460 search results - page 67 / 92
» Sharing Private Information Across Distributed Databases
Sort
View
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
14 years 11 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...
ECTEL
2006
Springer
15 years 5 months ago
iCamp - The Educational Web for Higher Education
iCamp is an EC-funded research project in the area of Technology Enhanced Learning (TEL) that aims to support collaboration and social networking across systems, countries and disc...
Barbara Kieslinger, Fridolin Wild, Onur Ihsan Arsu...
VLDB
2000
ACM
126views Database» more  VLDB 2000»
15 years 4 months ago
Computing Geographical Scopes of Web Resources
Many information resources on the web are relevant primarily to limited geographical communities. For instance, web sites containing information on restaurants, theaters, and apar...
Junyan Ding, Luis Gravano, Narayanan Shivakumar
IMC
2007
ACM
15 years 2 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 7 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...