350
click to vote
ICDE
16 years 11 months ago
2007 IEEE
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
204
click to vote
ICDE
16 years 1 months ago
2007 IEEE
This demo presents Casper; a framework in which users entertain anonymous location-based services. Casper consists of two main components; the location anonymizer that blurs the u...
167
click to vote
ICDE
16 years 1 months ago
2007 IEEE
We have earlier proposed the tight-coupling architecture for adding new data types into the DBMS engine. In this paper, we introduce the Odysseus ORDBMS and present its tightly-co...
104
click to vote
ICDE
15 years 6 months ago
2007 IEEE
In situ wireless sensor networks, not only have to route sensed data from sources to destinations, but also have to filter and fuse observations to eliminate potentially irreleva...
108
click to vote
ICDE
15 years 6 months ago
2007 IEEE
Similarity search usually encounters a serious problem in the high dimensional space, known as the “curse of dimensionality”. In order to speed up the retrieval efficiency, p...
|