Sciweavers

3686 search results - page 339 / 738
» Comprehensive comprehensions
Sort
View
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 4 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
259
Voted
ICDE
2006
IEEE
194views Database» more  ICDE 2006»
16 years 4 months ago
The Gauss-Tree: Efficient Object Identification in Databases of Probabilistic Feature Vectors
In applications of biometric databases the typical task is to identify individuals according to features which are not exactly known. Reasons for this inexactness are varying meas...
Alexey Pryakhin, Christian Böhm, Matthias Sch...
240
Voted
ICDE
2006
IEEE
178views Database» more  ICDE 2006»
16 years 4 months ago
Characterizing and Exploiting Reference Locality in Data Stream Applications
In this paper, we investigate a new approach to process queries in data stream applications. We show that reference locality characteristics of data streams could be exploited in ...
Feifei Li, Ching Chang, George Kollios, Azer Besta...
223
Voted
ICDE
2001
IEEE
159views Database» more  ICDE 2001»
16 years 4 months ago
Workflow and Process Synchronization with Interaction Expressions and Graphs
Current workflow management technology does not provide adequate means for inter-workflow coordination as concurrently executing workflows are considered completely independent. W...
Christian Heinlein
ICDE
1999
IEEE
109views Database» more  ICDE 1999»
16 years 4 months ago
On the Semantics of Complex Events in Active Database Management Systems
Active database management systems have been developed for applications needing an automatic reaction in response to certain events. Events can be simple in nature or complex. Com...
Detlef Zimmer, Rainer Unland