Error logs are a fruitful source of information both for diagnosis as well as for proactive fault handling ? however elaborate data preparation is necessary to filter out valuable...
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Web services communities can be seen as virtual clusters that agglomerate Web services with the same functionality (e.g., FlightBooking). However, selecting a community to deal wi...
Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jam...
We propose a system which extracts faces and person names from news articles with photos on the Web and associates them automatically. The system detects face images in news photo...