Sciweavers

889 search results - page 109 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
15 years 10 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
VLDB
1994
ACM
149views Database» more  VLDB 1994»
15 years 1 months ago
Qualified Answers That Reflect User Needs and Preferences
This paper introduces a formalism to describe the needs and preferences of database users. Because of the precise formulation of these concepts, we have found an automatic and ver...
Terry Gaasterland, Jorge Lobo
GIS
2007
ACM
15 years 11 months ago
Robust location search from text queries
Robust, global, address geocoding is challenging because there is no single address format that applies to all geographies, and in any case, users may not restrict themselves to w...
Vibhuti S. Sengar, Tanuja Joshi, Joseph Joy, Samar...
DBKDA
2010
IEEE
169views Database» more  DBKDA 2010»
15 years 2 months ago
XLeaf: Twig Evaluation with Skipping Loop Joins and Virtual Nodes
Abstract—XML indexing and search has become an important topic, and twig joins are key building blocks in XML search systems. This paper describes a novel approach using a nested...
Nils Grimsmo, Truls Amundsen Bjørklund, &Os...
ICDE
2009
IEEE
173views Database» more  ICDE 2009»
15 years 11 months ago
Efficient Processing of Warping Time Series Join of Motion Capture Data
Discovering non-trivial matching subsequences from two time series is very useful in synthesizing novel time series. This can be applied to applications such as motion synthesis wh...
Yueguo Chen, Gang Chen, Ke Chen, Beng Chin Ooi