Sciweavers

VLDB
2010
ACM
214views Database» more  VLDB 2010»
12 years 10 months ago
Privacy policies for shared content in social network sites
Anna Cinzia Squicciarini, Mohamed Shehab, Joshua W...
VLDB
2010
ACM
95views Database» more  VLDB 2010»
12 years 10 months ago
Multimodal social intelligence in a real-time dashboard system
Daniel Gruhl, Meenakshi Nagarajan, Jan Pieper, Chr...
VLDB
2010
ACM
127views Database» more  VLDB 2010»
12 years 10 months ago
Structural consistency: enabling XML keyword search to eliminate spurious results consistently
Ki-Hoon Lee, Kyu-Young Whang, Wook-Shin Han, Min-S...
VLDB
2010
ACM
227views Database» more  VLDB 2010»
13 years 2 months ago
Supporting ranking queries on uncertain and incomplete data
Mohamed A. Soliman, Ihab F. Ilyas, Shalev Ben-Davi...
VLDB
2010
ACM
155views Database» more  VLDB 2010»
13 years 2 months ago
Top-k queries on temporal data
Feifei Li, Ke Yi, Wangchao Le
VLDB
2010
ACM
137views Database» more  VLDB 2010»
13 years 2 months ago
Path prediction and predictive range querying in road network databases
Hoyoung Jeung, Man Lung Yiu, Xiaofang Zhou, Christ...
VLDB
2010
ACM
192views Database» more  VLDB 2010»
13 years 2 months ago
Enabling search services on outsourced private spatial data
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...
VLDB
2010
ACM
96views Database» more  VLDB 2010»
13 years 2 months ago
Threshold-based probabilistic top-k dominating queries
Wenjie Zhang, Xuemin Lin, Ying Zhang, Jian Pei, We...
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 2 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2010
ACM
147views Database» more  VLDB 2010»
13 years 2 months ago
A framework for testing DBMS features
Eric Lo, Carsten Binnig, Donald Kossmann, M. Tamer...