Sciweavers

889 search results - page 42 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
15 years 9 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
TITB
2008
204views more  TITB 2008»
14 years 9 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
ICDE
2010
IEEE
254views Database» more  ICDE 2010»
15 years 9 months ago
Efficient Rank Based KNN Query Processing Over Uncertain Data
Uncertain data are inherent in many applications such as environmental surveillance and quantitative economics research. As an important problem in many applications, KNN query has...
Ying Zhang, Xuemin Lin, Gaoping ZHU, Wenjie Zhang,...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 13 days ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
77
Voted
SAC
2004
ACM
15 years 3 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman