Sciweavers

889 search results - page 56 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
PODS
2005
ACM
115views Database» more  PODS 2005»
15 years 9 months ago
Histograms revisited: when are histograms the best approximation method for aggregates over joins?
The traditional statistical assumption for interpreting histograms and justifying approximate query processing methods based on them is that all elements in a bucket have the same...
Alin Dobra
ICASSP
2008
IEEE
15 years 4 months ago
Query by humming of midi and audio using locality sensitive hashing
This paper proposes a query by humming method based on locality sensitive hashing (LSH). The method constructs an index of melodic fragments by extracting pitch vectors from a dat...
Matti Ryynänen, Anssi Klapuri
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 2 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
63
Voted
DCC
2007
IEEE
15 years 9 months ago
Nonuniform Compression in Databases with Haar Wavelet
Data synopsis is a lossy compressed representation of data stored into databases that helps the query optimizer to speed up the query process, e.g. time to retrieve the data from ...
S. Chen, A. Nucci
VLDB
2005
ACM
132views Database» more  VLDB 2005»
15 years 3 months ago
MIX: A Meta-data Indexing System for XML
We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data wit...
SungRan Cho, Nick Koudas, Divesh Srivastava