Sciweavers

1176 search results - page 212 / 236
» Theory and Applications of Robust Optimization
Sort
View
PODS
2001
ACM
148views Database» more  PODS 2001»
15 years 12 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
ICDT
2010
ACM
211views Database» more  ICDT 2010»
15 years 9 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
MOBICOM
2006
ACM
15 years 5 months ago
Long-distance 802.11b links: performance measurements and experience
The use of 802.11 long-distance links is a cost-effective means of providing wireless connectivity to rural areas. Although deployments in this setting are increasing, a systemat...
Kameswari Chebrolu, Bhaskaran Raman, Sayandeep Sen
FLAIRS
2004
15 years 1 months ago
Inducing Fuzzy Decision Trees in Non-Deterministic Domains using CHAID
Most decision tree induction methods used for extracting knowledge in classification problems are unable to deal with uncertainties embedded within the data, associated with human...
Jay Fowdar, Zuhair Bandar, Keeley A. Crockett
ACL
2003
15 years 1 months ago
Recognizing Expressions of Commonsense Psychology in English Text
Many applications of natural language processing technologies involve analyzing texts that concern the psychological states and processes of people, including their beliefs, goals...
Andrew Gordon, Abe Kazemzadeh, Anish Nair, Milena ...