Sciweavers

464 search results - page 21 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
SIGMOD
1999
ACM
110views Database» more  SIGMOD 1999»
15 years 2 months ago
Multi-dimensional Selectivity Estimation Using Compressed Histogram Information
The database query optimizer requires the estimation of the query selectivity to find the most efficient access plan. For queries referencing multiple attributes from the same rel...
Ju-Hong Lee, Deok-Hwan Kim, Chin-Wan Chung
82
Voted
PODS
2005
ACM
96views Database» more  PODS 2005»
15 years 9 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
BMCBI
2004
196views more  BMCBI 2004»
14 years 9 months ago
MUSCLE: a multiple sequence alignment method with reduced time and space complexity
Background: In a previous paper, we introduced MUSCLE, a new program for creating multiple alignments of protein sequences, giving a brief summary of the algorithm and showing MUS...
Robert C. Edgar
SIGMOD
2001
ACM
158views Database» more  SIGMOD 2001»
15 years 9 months ago
Generating Efficient Plans for Queries Using Views
We study the problem of generating e cient, equivalent rewritings using views to compute the answer to a query. We take the closed-world assumption, in which views are materialize...
Foto N. Afrati, Chen Li, Jeffrey D. Ullman
CHI
2008
ACM
15 years 10 months ago
From meiwaku to tokushita!: lessons for digital money design from japan
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communicati...
Scott D. Mainwaring, Wendy March, Bill Maurer