The database query optimizer requires the estimation of the query selectivity to find the most efficient access plan. For queries referencing multiple attributes from the same rel...
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Background: In a previous paper, we introduced MUSCLE, a new program for creating multiple alignments of protein sequences, giving a brief summary of the algorithm and showing MUS...
We study the problem of generating e cient, equivalent rewritings using views to compute the answer to a query. We take the closed-world assumption, in which views are materialize...
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communicati...