Sciweavers

438 search results - page 60 / 88
» The forest hiding problem
Sort
View
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
15 years 9 months ago
Constraint-Based Subspace Clustering.
In high dimensional data, the general performance of traditional clustering algorithms decreases. This is partly because the similarity criterion used by these algorithms becomes ...
Élisa Fromont, Adriana Prado, Céline...
CSE
2009
IEEE
15 years 6 months ago
Open Editing Algorithm: A Collaborative News Promotion Algorithm Based on Users' Voting History
—In social news services, selecting valuable and credible news content is one of the most important issues. In traditional journalism, a small number of people called editors sel...
Joonseong Ko, Kanghak Kim, Ohyeon Kweon, Jongwook ...
CIKM
2009
Springer
15 years 6 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
ICHIT
2009
Springer
15 years 6 months ago
Middleware-based distributed systems software process
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...
Liu Jingyong, Zhong Yong, Chen Yong, Zhang Lichen
LOCA
2009
Springer
15 years 6 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung