Sciweavers

CIKM
2006
Springer
15 years 7 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
EH
2004
IEEE
94views Hardware» more  EH 2004»
15 years 7 months ago
Processor Architectures for Ontogenesis
In this article we present the outline of a novel processor architecture aimed to the design of systems that more closely resemble, within the limitations imposed by the capabilit...
Gianluca Tempesti
140
Voted
CIKM
2006
Springer
15 years 7 months ago
Approximate reverse k-nearest neighbor queries in general metric spaces
In this paper, we propose an approach for efficient approximative RkNN search in arbitrary metric spaces where the value of k is specified at query time. Our method uses an approx...
Elke Achtert, Christian Böhm, Peer Kröge...
EH
2004
IEEE
110views Hardware» more  EH 2004»
15 years 7 months ago
A Genetic Algorithm for the Optimisation of a Reconfigurable Pipelined FFT Processor
This paper describes the optimisation of the word length in a 16-point radix-4 reconfigurable pipelined Fast Fourier Transform (FFT) based receiver device. Two forms of optimisati...
Nasri Sulaiman, Tughrul Arslan
149
Voted
CIKM
2006
Springer
15 years 7 months ago
Matching and evaluation of disjunctive predicates for data stream sharing
New optimization techniques, e. g., in data stream management systems (DSMSs), make the treatment of disjunctive predicates a necessity. In this paper, we introduce and compare me...
Richard Kuntschke, Alfons Kemper