Sciweavers

EDBT
2009
ACM
158views Database» more  EDBT 2009»
13 years 7 months ago
An approach to detecting relevant updates to cached data using XML and active databases
Client/server information systems use caching techniques to reduce the volume of transmitted data as well as response time and, especially in the case of systems with mobile clien...
Essam Mansour, Hagen Höpfner
EDBT
2009
ACM
131views Database» more  EDBT 2009»
13 years 7 months ago
Sample synopses for approximate answering of group-by queries
With the amount of data in current data warehouse databases growing steadily, random sampling is continuously gaining in importance. In particular, interactive analyses of large d...
Philipp Rösch, Wolfgang Lehner
EDBT
2009
ACM
207views Database» more  EDBT 2009»
13 years 7 months ago
Evaluating probability threshold k-nearest-neighbor queries over uncertain data
In emerging applications such as location-based services, sensor monitoring and biological management systems, the values of the database items are naturally imprecise. For these ...
Reynold Cheng, Lei Chen 0002, Jinchuan Chen, Xike ...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 8 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
EDBT
2009
ACM
100views Database» more  EDBT 2009»
13 years 8 months ago
Efficiently indexing shortest paths by exploiting symmetry in graphs
Yanghua Xiao, Wentao Wu, Jian Pei, Wei Wang 0009, ...
EDBT
2009
ACM
122views Database» more  EDBT 2009»
13 years 8 months ago
Finding the influence set through skylines
Given a set P of products, a set O of customers, and a product p P, a bichromatic reverse skyline query retrieves all the customers in O that do not find any other product in P t...
Xiaobing Wu, Yufei Tao, Raymond Chi-Wing Wong, Lin...
EDBT
2009
ACM
170views Database» more  EDBT 2009»
13 years 8 months ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
EDBT
2009
ACM
164views Database» more  EDBT 2009»
13 years 8 months ago
Efficient identification of starters and followers in social media
Activity and user engagement in social media such as web logs, wikis, online forums or social networks has been increasing at unprecedented rates. In relation to social behavior i...
Michael Mathioudakis, Nick Koudas
EDBT
2009
ACM
148views Database» more  EDBT 2009»
13 years 8 months ago
MVT: a schema mapping validation tool
Schema mappings define relationships between schemas in a declarative way. We demonstrate MVT, a mapping validation tool that allows the designer to ask whether the mapping has ce...
Guillem Rull, Carles Farré, Ernest Teniente...
EDBT
2009
ACM
128views Database» more  EDBT 2009»
13 years 8 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu