找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Web-Age Information Management; 17th International C Bin Cui,Nan Zhang,Dexi Liu Conference proceedings 2016 Springer International Publishi

[复制链接]
楼主: BREED
发表于 2025-3-23 11:52:53 | 显示全部楼层
Preserving the ,-Reachability When Anonymizing Social Networks, and keep it unchanged during anonymization. We show that .-RPA can efficiently find such a subgraph and anonymize the releasing graph with low information loss. Extensive experiments on real datasets illustrate that anonymized social networks generated by our method can be used to answer .-reachable queries with high accuracy.
发表于 2025-3-23 15:34:02 | 显示全部楼层
Preserving the ,-Reachability When Anonymizing Social Networks, and keep it unchanged during anonymization. We show that .-RPA can efficiently find such a subgraph and anonymize the releasing graph with low information loss. Extensive experiments on real datasets illustrate that anonymized social networks generated by our method can be used to answer .-reachable queries with high accuracy.
发表于 2025-3-23 20:06:51 | 显示全部楼层
发表于 2025-3-23 23:56:45 | 显示全部楼层
Personalized Location Anonymity - A Kernel Density Estimation Approache selected based on both the entropy of personal visit probability and the area of Cloaking Region (CR). We conduct extensive experiments on the real dataset to verify the performance of privacy protection degree, where the privacy properties are measured by the location information entropy and the area of CR.
发表于 2025-3-24 02:23:11 | 显示全部楼层
Detecting Data-model-oriented Anomalies in Parallel Business Processallel-process model and the data model. Then, an anomaly detection method under the divide-and-conquer framework is proposed to ensure efficiency in detecting anomalies in business processes. Both theoretical analysis and experimental results prove this method to be highly efficient and effective in detecting data model oriented anomalies.
发表于 2025-3-24 07:57:13 | 显示全部楼层
Detecting Data-model-oriented Anomalies in Parallel Business Processallel-process model and the data model. Then, an anomaly detection method under the divide-and-conquer framework is proposed to ensure efficiency in detecting anomalies in business processes. Both theoretical analysis and experimental results prove this method to be highly efficient and effective in detecting data model oriented anomalies.
发表于 2025-3-24 12:52:02 | 显示全部楼层
Learning User Credibility on Aspects from Review Textse aspect ratings are assigned by mining semantic polarity. Then, an iteration algorithm is designed for estimating credibilities by considering the consistency between individual ratings and overall ratings on aspects. Finally, experiments on the real dataset demonstrate that our method outperforms baseline systems.
发表于 2025-3-24 15:22:09 | 显示全部楼层
Learning User Credibility on Aspects from Review Textse aspect ratings are assigned by mining semantic polarity. Then, an iteration algorithm is designed for estimating credibilities by considering the consistency between individual ratings and overall ratings on aspects. Finally, experiments on the real dataset demonstrate that our method outperforms baseline systems.
发表于 2025-3-24 22:15:02 | 显示全部楼层
发表于 2025-3-25 00:44:32 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 02:25
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表