Sciweavers

TKDE
2008
111views more  TKDE 2008»
13 years 4 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
TKDE
2008
121views more  TKDE 2008»
13 years 4 months ago
Schema Matching Using Interattribute Dependencies
Schema matching is one of the key challenges in information integration. It is a labor-intensive and time-consuming process. To alleviate the problem, many automated solutions have...
Jaewoo Kang, Jeffrey F. Naughton
TKDE
2008
218views more  TKDE 2008»
13 years 4 months ago
A General Model for Sequential Pattern Mining with a Progressive Database
Although there have been many recent studies on the mining of sequential patterns in a static database and in a database with increasing data, these works, in general, do not fully...
Jen-Wei Huang, Chi-Yao Tseng, Jian Chih Ou, Ming-S...
TKDE
2008
119views more  TKDE 2008»
13 years 4 months ago
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies
Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
TKDE
2008
125views more  TKDE 2008»
13 years 4 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
TKDE
2008
146views more  TKDE 2008»
13 years 4 months ago
Toward Managing Uncertain Spatial Information for Situational Awareness Applications
Situational awareness (SA) applications monitor the real world and the entities therein to support tasks such as rapid decision making, reasoning, and analysis. Raw input about unf...
Yiming Ma, Dmitri V. Kalashnikov, Sharad Mehrotra
TKDE
2008
123views more  TKDE 2008»
13 years 4 months ago
DiSC: Benchmarking Secure Chip DBMS
Secure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data manag...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, ...
TKDE
2008
378views more  TKDE 2008»
13 years 4 months ago
Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases
In this paper, we propose an image semantic model based on the knowledge and criteria in the field of linguistics and taxonomy. Our work bridges the "semantic gap" by sea...
Xiaoyan Li, Lidan Shou, Gang Chen, Tianlei Hu, Jin...
TKDE
2008
103views more  TKDE 2008»
13 years 4 months ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...
TKDE
2008
128views more  TKDE 2008»
13 years 4 months ago
Using Context to Improve Predictive Modeling of Customers in Personalization Applications
The idea that context is important when predicting customer behavior has been maintained by scholars in marketing and data mining. However, no systematic study measuring how much t...
Cosimo Palmisano, Alexander Tuzhilin, Michele Gorg...