Sciweavers

101 search results - page 4 / 21
» edbt 2008
Sort
View
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 6 months ago
BITPEER: continuous subspace skyline computation with distributed bitmap indexes
In this paper, we propose a bitmap approach for efficient subspace skyline computation in a distributed setting. Our approach computes extended skylines which have been shown to i...
Katerina Fotiadou, Evaggelia Pitoura
EDBT
2008
ACM
113views Database» more  EDBT 2008»
14 years 6 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 6 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
EDBT
2008
ACM
140views Database» more  EDBT 2008»
13 years 8 months ago
Database Servers Tailored to Improve Energy Efficiency
Database software can be tailored for specific application domains and their required functionality, for specific hardware and its characteristics, or for other purposes. This bri...
Goetz Graefe
EDBT
2008
ACM
144views Database» more  EDBT 2008»
14 years 6 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta