Sciweavers

8468 search results - page 190 / 1694
» The Technology of Data Stashing
Sort
View
DAMON
2006
Springer
15 years 9 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
ECAI
2010
Springer
15 years 6 months ago
A Fault-model-based Debugging Aid for Data Warehouse Applications
The paper describes a model-based approach to developing a general tool for localizing faults in applications of data warehouse technology. A model of the application is configured...
Peter Struss, Vikas Shivashankar, Mohamed Zahoor
IDA
2008
Springer
15 years 5 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
WWW
2007
ACM
16 years 6 months ago
Web page classification with heterogeneous data fusion
Web pages are more than text and they contain much contextual and structural information, e.g., the title, the meta data, the anchor text, etc., each of which can be seen as a dat...
Zenglin Xu, Irwin King, Michael R. Lyu
ICDCIT
2010
Springer
16 years 2 months ago
Maintaining Coherent Views over Dynamic Distributed Data
Data delivered today over the web reflects rapid and unpredictable changes in the world around us. We are increasingly relying on content that provides dynamic, interactive, person...
Krithi Ramamritham