Sciweavers

889 search results - page 55 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
89
Voted
DEXAW
2007
IEEE
113views Database» more  DEXAW 2007»
15 years 1 months ago
A new domain-based payment model for emerging mobile commerce scenarios
Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
Diego Suarez, Joaquín Torres Márquez...
GIS
2009
ACM
15 years 4 months ago
Constrained reverse nearest neighbor search on mobile objects
In this paper, we formalize the novel concept of Constrained Reverse k-Nearest Neighbor (CRkNN) search on mobile objects (clients) performed at a central server. The CRkNN query c...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...
81
Voted
VLDB
2007
ACM
139views Database» more  VLDB 2007»
15 years 3 months ago
A Bayesian Method for Guessing the Extreme Values in a Data Set
For a large number of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smalles...
Mingxi Wu, Chris Jermaine
JIT
2005
Springer
134views Database» more  JIT 2005»
15 years 3 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
ADC
2007
Springer
193views Database» more  ADC 2007»
15 years 3 months ago
Optimizing XPath Queries on Streaming XML Data
XML stream processing has recently become popular for many applications such as selective dissemination of information. Several approaches have been proposed and most of them are ...
Keerati Jittrawong, Raymond K. Wong