Sciweavers

1856 search results - page 258 / 372
» cluster 2008
Sort
View
99
Voted
OSDI
2008
ACM
16 years 1 months ago
Error Log Processing for Accurate Failure Prediction
Error logs are a fruitful source of information both for diagnosis as well as for proactive fault handling ? however elaborate data preparation is necessary to filter out valuable...
Felix Salfner, Steffen Tschirpke
192
Voted
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 29 days ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
119
Voted
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 26 days ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
103
Voted
AINA
2008
IEEE
15 years 7 months ago
Reputation of Communities of Web Services - Preliminary Investigation
Web services communities can be seen as virtual clusters that agglomerate Web services with the same functionality (e.g., FlightBooking). However, selecting a community to deal wi...
Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jam...
98
Voted
AINA
2008
IEEE
15 years 7 months ago
Associating Faces and Names in Japanese Photo News Articles on the Web
We propose a system which extracts faces and person names from news articles with photos on the Web and associates them automatically. The system detects face images in news photo...
Akio Kitahara, Taichi Joutou, Keiji Yanai