Sciweavers

889 search results - page 26 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
80
Voted
DEXA
2005
Springer
110views Database» more  DEXA 2005»
15 years 3 months ago
Intensional Encapsulations of Database Subsets via Genetic Programming
Finding intensional encapsulations of database subsets is the inverse of query evaluation. Whereas query evaluation transforms an intensional expression (the query) to its extensi...
Aybar C. Acar, Amihai Motro
99
Voted
VLDB
2002
ACM
108views Database» more  VLDB 2002»
14 years 9 months ago
Energy-performance trade-offs for spatial access methods on memory-resident data
Abstract. The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of syste...
Ning An, Sudhanva Gurumurthi, Anand Sivasubramania...
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
15 years 11 months ago
Efficient Query Processing in Large Traffic Networks
Abstract-- We present an original graph embedding to speedup distance-range and k-nearest neighbor queries on static and/or dynamic objects located on a (weighted) graph. Our metho...
Hans-Peter Kriegel, Matthias Renz, Peer Kröge...
82
Voted
DEXAW
2002
IEEE
97views Database» more  DEXAW 2002»
15 years 2 months ago
Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mo...
Yan Wang 0002, Kian-Lee Tan, Xiaolin Pang
ADBIS
2000
Springer
169views Database» more  ADBIS 2000»
15 years 2 months ago
Data Organization Issues for Location-Dependent Queries in Mobile Computing
We consider queries which originate from a mobile unit and whose result depends on the location of the user who initiates the query. Example of such a query is How many people are ...
Sanjay Kumar Madria, Bharat K. Bhargava, Evaggelia...