Sciweavers

889 search results - page 65 / 178
» A Method for Secure Query Processing in Mobile Databases
Sort
View
WWW
2006
ACM
15 years 10 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
ICDE
2008
IEEE
160views Database» more  ICDE 2008»
15 years 11 months ago
Exploiting Lineage for Confidence Computation in Uncertain and Probabilistic Databases
We study the problem of computing query results with confidence values in ULDBs: relational databases with uncertainty and lineage. ULDBs, which subsume probabilistic databases, o...
Anish Das Sarma, Martin Theobald, Jennifer Widom
GIS
2004
ACM
15 years 10 months ago
Supporting spatial aggregation in sensor network databases
Sensor networks are unattended deeply distributed systems whose schema can be conceptualized using the relational model. Aggregation queries on the data sampled at each ode are th...
Mehdi Sharifzadeh, Cyrus Shahabi
VLDB
2007
ACM
121views Database» more  VLDB 2007»
15 years 10 months ago
TRAX - Real-World Tracking of Moving Objects
A range of mobile services rely on knowing the current positions of populations of so-called moving objects. In the ideal setting, the positions of all objects are known always an...
Christian S. Jensen, Stardas Pakalnis
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
15 years 3 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...