Sciweavers

889 search results - page 109 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 2 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
131
Voted
VLDB
1994
ACM
149views Database» more  VLDB 1994»
15 years 6 months ago
Qualified Answers That Reflect User Needs and Preferences
This paper introduces a formalism to describe the needs and preferences of database users. Because of the precise formulation of these concepts, we have found an automatic and ver...
Terry Gaasterland, Jorge Lobo
206
Voted
GIS
2007
ACM
16 years 3 months ago
Robust location search from text queries
Robust, global, address geocoding is challenging because there is no single address format that applies to all geographies, and in any case, users may not restrict themselves to w...
Vibhuti S. Sengar, Tanuja Joshi, Joseph Joy, Samar...
138
Voted
DBKDA
2010
IEEE
169views Database» more  DBKDA 2010»
15 years 7 months ago
XLeaf: Twig Evaluation with Skipping Loop Joins and Virtual Nodes
Abstract—XML indexing and search has become an important topic, and twig joins are key building blocks in XML search systems. This paper describes a novel approach using a nested...
Nils Grimsmo, Truls Amundsen Bjørklund, &Os...
272
Voted
ICDE
2009
IEEE
173views Database» more  ICDE 2009»
16 years 4 months ago
Efficient Processing of Warping Time Series Join of Motion Capture Data
Discovering non-trivial matching subsequences from two time series is very useful in synthesizing novel time series. This can be applied to applications such as motion synthesis wh...
Yueguo Chen, Gang Chen, Ke Chen, Beng Chin Ooi