Sciweavers

Share
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
9 years 6 months ago
Privacy Preserving Clustering on Horizontally Partitioned Data
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. The power of data mining tools to extract hidden information that can...
Ali Inan, Yücel Saygin, Erkay Savas, Ay&ccedi...
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
9 years 6 months ago
On Potential Validity of Document-Centric XML Documents
Document-centric XML document creation is a process of marking up textual content rather than typing text in a predefined structure. It turns out that, although the final docume...
Ionut Emil Iacob, Alex Dekhtyar, Michael I. Dekhty...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
9 years 6 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
ICDE
2006
IEEE
113views Database» more  ICDE 2006»
9 years 6 months ago
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider o...
Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anan...
ICDE
2006
IEEE
202views Database» more  ICDE 2006»
9 years 6 months ago
Message from Demo Chairs
Govi Govindarajan, Leo Mark, Arjen P. de Vries
ICDE
2006
IEEE
147views Database» more  ICDE 2006»
9 years 6 months ago
Distributing Google
We consider the problem of wide-area large-scale text search over a peer-to-peer infrastructure. A wide-area search infrastructure with billions of documents and millions of searc...
Vijay Gopalakrishnan, Bobby Bhattacharjee, Peter J...
ICDE
2006
IEEE
146views Database» more  ICDE 2006»
9 years 6 months ago
Supporting Predicate-Window Queries in Data Stream Management Systems
The window query model is widely used in data stream management systems where the focus of a continuous query is limited to a set of the most recent tuples. In this dissertation, ...
Thanaa M. Ghanem
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
9 years 6 months ago
Reputation Lending for Virtual Communities
Reputation management schemes have recently emerged as a mechanism for improving trust and security in peer-topeer networks. A new entrant in a network with reputation management ...
Anurag Garg, Alberto Montresor, Roberto Battiti
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
9 years 6 months ago
A Survey on Disk Oriented Querying and Reasoning on the Semantic Web
This paper presents a description of seven systems, which use database technology to both represent knowledge persistently and make scalable queries on it, in the Semantic Web con...
María del Mar Roldán García, ...
ICDE
2006
IEEE
169views Database» more  ICDE 2006»
9 years 6 months ago
Unsupervised Outlier Detection in Time Series Data
Fraud detection is of great importance to financial institutions. This paper is concerned with the problem of finding outliers in time series financial data using Peer Group Analy...
Zakia Ferdousi, Akira Maeda
books