Sciweavers

4150 search results - page 723 / 830
» A Practical Approach to Model Extension
Sort
View
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 9 days ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
CADE
2006
Springer
16 years 6 days ago
Automatic Construction and Verification of Isotopy Invariants
Abstract. We extend our previous study of the automatic construction of isomorphic classification theorems for algebraic domains by considering the isotopy equivalence relation. Is...
Volker Sorge, Andreas Meier, Roy L. McCasland, Sim...
VLDB
2008
ACM
140views Database» more  VLDB 2008»
16 years 3 days ago
Efficient temporal counting with bounded error
This paper studies aggregate search in transaction time databases. Specifically, each object in such a database can be modeled as a horizontal segment, whose y-projection is its s...
Yufei Tao, Xiaokui Xiao
SIGMOD
2008
ACM
205views Database» more  SIGMOD 2008»
16 years 1 days ago
Monochromatic and bichromatic reverse skyline search over uncertain databases
Reverse skyline queries over uncertain databases have many important applications such as sensor data monitoring and business planning. Due to the existence of uncertainty in many...
Xiang Lian, Lei Chen 0002
SIGMOD
2007
ACM
156views Database» more  SIGMOD 2007»
16 years 1 days ago
M-invariance: towards privacy preserving re-publication of dynamic datasets
The previous literature of privacy preserving data publication has focused on performing "one-time" releases. Specifically, none of the existing solutions supports re-pu...
Xiaokui Xiao, Yufei Tao