Sciweavers

1497 search results - page 169 / 300
» Constraint Databases: A Survey
Sort
View
PODS
2008
ACM
178views Database» more  PODS 2008»
15 years 10 months ago
The chase revisited
We revisit the classical chase procedure, studying its properties as well as its applicability to standard database problems. We settle (in the negative) the open problem of decid...
Alin Deutsch, Alan Nash, Jeffrey B. Remmel
PVLDB
2010
151views more  PVLDB 2010»
14 years 8 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris
ESCAPE
2007
Springer
212views Algorithms» more  ESCAPE 2007»
15 years 4 months ago
Streaming Algorithms for Data in Motion
We propose two new data stream models: the reset model and the delta model, motivated by applications to databases, and to tracking the location of spatial points. We present algor...
Michael Hoffmann 0002, S. Muthukrishnan, Rajeev Ra...
TLCA
2005
Springer
15 years 3 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
157
Voted
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
15 years 11 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa