Sciweavers

8468 search results - page 187 / 1694
» The Technology of Data Stashing
Sort
View
WEBI
2005
Springer
15 years 11 months ago
Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data
Collaborative filtering techniques are widely used by many E-commerce sites for recommendation purposes. Such techniques help customers by suggesting products to purchase using o...
Huseyin Polat, Wenliang Du
HOLOMAS
2003
Springer
15 years 10 months ago
Complex Data Integration Based on a Multi-agent System
The expansion of the WWW and the growth of data sources lead to the proliferation of heterogeneous data (texts, images, videos, sounds and relational views). We call these data ”...
Omar Boussaid, Fadila Bentayeb, Amandine Duffoux, ...
ENTCS
2006
145views more  ENTCS 2006»
15 years 5 months ago
A Calculus for Data Mapping
Technologies for overcoming heterogeneities between autonomous data sources are key in the emerging networked world. In this paper we discuss the initial results of a formal inves...
George H. L. Fletcher, Catharine M. Wyss, Edward L...
OTM
2010
Springer
15 years 3 months ago
A Metamodel for Master Data
Abstract. The term ‘Master Data’ brings up different interpretations and connotations, especially with vendors espousing the “single version of the truth”. Is there a singl...
Baba Piprani, Suneil Dham
WEBI
2009
Springer
16 years 1 days ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham