Sciweavers

11 search results - page 2 / 3
» Authenticated indexing for outsourced spatial databases
Sort
View
GIS
2010
ACM
13 years 3 months ago
Verifying spatial queries using Voronoi neighbors
With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the...
Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Sha...
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 3 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 5 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 7 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
ICDE
2010
IEEE
247views Database» more  ICDE 2010»
14 years 5 months ago
Efficient Verification of Shortest Path Search via Authenticated Hints
Shortest path search in transportation networks is unarguably one of the most important online search services nowadays (e.g., Google Maps, MapQuest, etc), with applications spanni...
Man Lung Yiu, Yimin Lin, Kyriakos Mouratidis