Sciweavers

10289 search results - page 36 / 2058
» Standard bases in K
Sort
View
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
15 years 3 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
ICDE
2012
IEEE
343views Database» more  ICDE 2012»
13 years 4 months ago
Bi-level Locality Sensitive Hashing for k-Nearest Neighbor Computation
We present a new Bi-level LSH algorithm to perform approximate k-nearest neighbor search in high dimensional spaces. Our formulation is based on a two-level scheme. In the first ...
Jia Pan, Dinesh Manocha
TIME
2006
IEEE
15 years 8 months ago
k-Anonymity in Databases with Timestamped Data
In this paper we extend the notion of k-anonymity in the context of databases with timestamped information in order to naturally define k-anonymous views of temporal data. We als...
Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wa...
CODES
1999
IEEE
15 years 6 months ago
How standards will enable hardware/software co-design
o much higher levels of abstraction than today's design practices, which are usually at the level of synthesizable RTL for custom hardware or Instruction Set Simulator (ISS) f...
Mark Genoe, Christopher K. Lennard, Joachim Kunkel...
BMCBI
2008
82views more  BMCBI 2008»
15 years 2 months ago
Standardized high-throughput evaluation of cell-based compound screens
Background: High-throughput screening of pharmaceutical compound activity in tissue culture experiments requires time-consuming repeated analysis of the large amounts of data gene...
Peter Frommolt, Roman K. Thomas