Sciweavers

889 search results - page 65 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
138
Voted
WWW
2006
ACM
16 years 3 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
209
Voted
ICDE
2008
IEEE
160views Database» more  ICDE 2008»
16 years 4 months ago
Exploiting Lineage for Confidence Computation in Uncertain and Probabilistic Databases
We study the problem of computing query results with confidence values in ULDBs: relational databases with uncertainty and lineage. ULDBs, which subsume probabilistic databases, o...
Anish Das Sarma, Martin Theobald, Jennifer Widom
230
Voted
GIS
2004
ACM
16 years 3 months ago
Supporting spatial aggregation in sensor network databases
Sensor networks are unattended deeply distributed systems whose schema can be conceptualized using the relational model. Aggregation queries on the data sampled at each ode are th...
Mehdi Sharifzadeh, Cyrus Shahabi
185
Voted
VLDB
2007
ACM
121views Database» more  VLDB 2007»
16 years 2 months ago
TRAX - Real-World Tracking of Moving Objects
A range of mobile services rely on knowing the current positions of populations of so-called moving objects. In the ideal setting, the positions of all objects are known always an...
Christian S. Jensen, Stardas Pakalnis
101
Voted
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
15 years 8 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...