Sciweavers

ICDE
2007
IEEE
145views Database» more  ICDE 2007»
13 years 11 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
13 years 11 months ago
Improved Buffer Size Adaptation through Cache/Controller Coupling
Database workloads seldom remain static. A system tuned by an expert for the current environment, might not always remain optimal. To deal with this situation, database systems ha...
Christian A. Lang, Bishwaranjan Bhattacharjee, Tim...
ICDE
2007
IEEE
204views Database» more  ICDE 2007»
13 years 11 months ago
OS_RANK: Structure Analysis for Ontology Ranking
Ontologies have been shown to be beneficial for representing domain knowledge, and are quickly becoming the backbone of the Semantic Web. The need for ontology ranking techniques ...
Wei Yu, Qing Li, Junpeng Chen, Jiaheng Cao
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
13 years 11 months ago
Embedding Emotional Context in Recommender Systems
Emotional context is becoming a promising paradigm to develop more intuitive and sensitive recommender systems. Ambient Recommender Systems, arise from the analysis of new trends ...
Gustavo González, Josep Lluís de la ...
ICDE
2007
IEEE
174views Database» more  ICDE 2007»
13 years 11 months ago
Adapting Partitioned Continuous Query Processing in Distributed Systems
Partitioned query processing is an effective method to process continuous queries with large stateful operators in a distributed systems. This method typically partitions input da...
Yali Zhu, Elke A. Rundensteiner
ICDE
2007
IEEE
169views Database» more  ICDE 2007»
13 years 11 months ago
Aggregate Query Answering on Anonymized Tables
Privacy is a serious concern when microdata need to be released for ad hoc analyses. The privacy goals of existing privacy protection approaches (e.g., -anonymity and -diversity) ...
Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Y...
ICDE
2007
IEEE
228views Database» more  ICDE 2007»
13 years 11 months ago
A General Cost Model for Dimensionality Reduction in High Dimensional Spaces
Similarity search usually encounters a serious problem in the high dimensional space, known as the “curse of dimensionality”. In order to speed up the retrieval efficiency, p...
Xiang Lian, Lei Chen 0002
ICDE
2007
IEEE
229views Database» more  ICDE 2007»
13 years 11 months ago
Data-quality Guided Load Shedding for Expensive In-Network Data Processing
In situ wireless sensor networks, not only have to route sensed data from sources to destinations, but also have to filter and fuse observations to eliminate potentially irreleva...
Lina Peng, K. Selçuk Candan
ICDE
2007
IEEE
120views Database» more  ICDE 2007»
13 years 11 months ago
Support Concurrent Queries in Multiuser CBIR Systems
Various techniques have been developed for different query types in content-based image retrieval (CBIR) systems such as sampling queries, constrained sampling queries, multiple c...
Danzhou Liu, Kien A. Hua