Sciweavers

8468 search results - page 198 / 1694
» The Technology of Data Stashing
Sort
View
KES
2008
Springer
15 years 5 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
IDA
2007
Springer
15 years 5 months ago
Anomaly detection in data represented as graphs
An important area of data mining is anomaly detection, particularly for fraud. However, little work has been done in terms of detecting anomalies in data that is represented as a g...
William Eberle, Lawrence B. Holder
204
Voted
GIS
2002
ACM
15 years 5 months ago
Interactive 3D visualization of vector data in GIS
Vector data represents one major category of data managed by GIS. This paper presents a new technique for vector-data display that is able to precisely and efficiently map vector ...
Oliver Kersting, Jürgen Döllner
IDA
2002
Springer
15 years 5 months ago
A framework for modelling virus gene expression data
Short, high-dimensional, Multivariate Time Series (MTS) data are common in many fields such as medicine, finance and science, and any advance in modelling this kind of data would b...
Paul Kellam, Xiaohui Liu, Nigel J. Martin, Christi...
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
16 years 6 months ago
PeerDB: A P2P-based System for Distributed Data Sharing
In this paper, we present the design and evaluation of PeerDB, a peer-to-peer (P2P) distributed data sharing system. PeerDB distinguishes itself from existing P2P systems in sever...
Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying ...