Sciweavers

EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 8 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
EDBT
2009
ACM
100views Database» more  EDBT 2009»
15 years 8 months ago
Efficiently indexing shortest paths by exploiting symmetry in graphs
Yanghua Xiao, Wentao Wu, Jian Pei, Wei Wang 0009, ...
EDBT
2009
ACM
122views Database» more  EDBT 2009»
15 years 8 months ago
Finding the influence set through skylines
Given a set P of products, a set O of customers, and a product p P, a bichromatic reverse skyline query retrieves all the customers in O that do not find any other product in P t...
Xiaobing Wu, Yufei Tao, Raymond Chi-Wing Wong, Lin...
GI
2007
Springer
15 years 8 months ago
TRUSTEE - Beratung beim Kauf von technischen Produkten
: Selbstberatung am Rechner beim Kauf eines technischen Produktes ist durch die Informationsvielfalt des Internets m
Sebastian Schmidt, Herbert Stoyan, Bernd Ludwig
EDBT
2009
ACM
170views Database» more  EDBT 2009»
15 years 8 months ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman