Sciweavers

703 search results - page 81 / 141
» The data management problem in post-pc devices and a solutio...
Sort
View
ICDM
2009
IEEE
155views Data Mining» more  ICDM 2009»
15 years 4 months ago
A Contrast Pattern Based Clustering Quality Index for Categorical Data
Since clustering is unsupervised and highly explorative, clustering validation (i.e. assessing the quality of clustering solutions) has been an important and long standing researc...
Qingbao Liu, Guozhu Dong
CCS
2007
ACM
15 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
KDD
2006
ACM
129views Data Mining» more  KDD 2006»
15 years 10 months ago
Suppressing model overfitting in mining concept-drifting data streams
Mining data streams of changing class distributions is important for real-time business decision support. The stream classifier must evolve to reflect the current class distributi...
Haixun Wang, Jian Yin, Jian Pei, Philip S. Yu, Jef...
CIKM
2009
Springer
15 years 4 months ago
Supporting context-based query in personal DataSpace
Many users need to refer to content in existing files (pictures, tables, emails, web pages and etc.) when they write documents(programs, presentations, proposals and etc.), and o...
Yukun Li, Xiaofeng Meng
ACSAC
2002
IEEE
15 years 2 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh