Sciweavers

7839 search results - page 1269 / 1568
» What's there and what's not
Sort
View
TKDE
2012
207views Formal Methods» more  TKDE 2012»
13 years 4 months ago
Mining Web Graphs for Recommendations
—As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommend...
Hao Ma, Irwin King, Michael R. Lyu
TKDE
2012
253views Formal Methods» more  TKDE 2012»
13 years 4 months ago
Adding Temporal Constraints to XML Schema
—If past versions of XML documents are retained, what of the various integrity constraints defined in XML Schema on those documents? This paper describes how to interpret such c...
Faiz Currim, Sabah Currim, Curtis E. Dyreson, Rich...
SDM
2012
SIAM
233views Data Mining» more  SDM 2012»
13 years 4 months ago
On Finding Joint Subspace Boolean Matrix Factorizations
Finding latent factors of the data using matrix factorizations is a tried-and-tested approach in data mining. But finding shared factors over multiple matrices is more novel prob...
Pauli Miettinen
EDBT
2012
ACM
254views Database» more  EDBT 2012»
13 years 4 months ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li
ESORICS
2012
Springer
13 years 4 months ago
Exploring Linkability of User Reviews
Large numbers of people all over the world read and contribute to various review sites. Many contributors are understandably concerned about privacy in general and, specifically,...
Mishari Al Mishari, Gene Tsudik
« Prev « First page 1269 / 1568 Last » Next »