Sciweavers

VLDB
2005
ACM
139views Database» more  VLDB 2005»
13 years 10 months ago
Statistical Learning Techniques for Costing XML Queries
Developing cost models for query optimization is significantly harder for XML queries than for traditional relational queries. The reason is that XML query operators are much mor...
Ning Zhang 0002, Peter J. Haas, Vanja Josifovski, ...
VLDB
2005
ACM
105views Database» more  VLDB 2005»
13 years 10 months ago
Light-weight Domain-based Form Assistant: Querying Web Databases On the Fly
The Web has been rapidly “deepened” by myriad searchable databases online, where data are hidden behind query forms. Helping users query alternative “deep Web” sources in ...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
VLDB
2005
ACM
113views Database» more  VLDB 2005»
13 years 10 months ago
AReNA: Adaptive Distributed Catalog Infrastructure Based On Relevance Networks
Vladimir Zadorozhny, Avigdor Gal, Louiqa Raschid, ...
VLDB
2005
ACM
135views Database» more  VLDB 2005»
13 years 10 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao
VLDB
2005
ACM
105views Database» more  VLDB 2005»
13 years 10 months ago
WmXML: A System for Watermarking XML Data
As increasing amount of data is published in the form of XML, copyright protection of XML data is becoming an important requirement for many applications. While digital watermarki...
Xuan Zhou, HweeHwa Pang, Kian-Lee Tan, Dhruv Mangl...
VLDB
2005
ACM
121views Database» more  VLDB 2005»
13 years 10 months ago
Improving Database Performance on Simultaneous Multithreading Processors
Simultaneous multithreading (SMT) allows multiple threads to supply instructions to the instruction pipeline of a superscalar processor. Because threads share processor resources,...
Jingren Zhou, John Cieslewicz, Kenneth A. Ross, Mi...
VLDB
2005
ACM
114views Database» more  VLDB 2005»
13 years 10 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
VLDB
2005
ACM
118views Database» more  VLDB 2005»
13 years 10 months ago
Mining Compressed Frequent-Pattern Sets
A major challenge in frequent-pattern mining is the sheer size of its mining results. In many cases, a high min sup threshold may discover only commonsense patterns but a low one ...
Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng
VLDB
2005
ACM
97views Database» more  VLDB 2005»
13 years 10 months ago
Query By Excel
Andrew Witkowski, Srikanth Bellamkonda, Tolga Bozk...
VLDB
2005
ACM
159views Database» more  VLDB 2005»
13 years 10 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu