Abstract. Ontology-based modelling is becoming increasingly important in the design of complex knowledge management applications. However, many problems related to large-scale onto...
Paolo Ceravolo, Angelo Corallo, Gianluca Elia, Ant...
Data exchange between embedded systems and other small or large computing devices increases. Since data in different data sources may refer to the same real world objects, data ca...
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much...
Mehmet Ercan Nergiz, Chris Clifton, A. Erhan Nergi...
Data sharing in current P2P systems is very much restricted to file-system-like capabilities. In this paper, we present the strategies that we have adopted in our BestPeer project...
We introduce the problem of mining association rules in large relational tables containing both quantitative and categorical attributes. An example of such an association might be...