Sciweavers

912 search results - page 70 / 183
» Design, Implementation, and Evaluation of a Repairable Datab...
Sort
View
87
Voted
CIDR
2007
79views Algorithms» more  CIDR 2007»
15 years 2 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
194
Voted
SIGMOD
2008
ACM
182views Database» more  SIGMOD 2008»
16 years 24 days ago
Multi-tenant databases for software as a service: schema-mapping techniques
In the implementation of hosted business services, multiple tenants are often consolidated into the same database to reduce total cost of ownership. Common practice is to map mult...
Stefan Aulbach, Torsten Grust, Dean Jacobs, Alfons...
106
Voted
SAC
2004
ACM
15 years 6 months ago
Creation and management of versions in multiversion data warehouse
A data warehouse (DW) provides an information for analytical processing, decision making, and data mining tools. On the one hand, the structure and content of a data warehouse ref...
Bartosz Bebel, Johann Eder, Christian Koncilia, Ta...
GIS
2009
ACM
16 years 1 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
COOPIS
2000
IEEE
15 years 5 months ago
Exploring the Semantic Structure of Technical Document Collections: A Cooperative Systems Approach
The identification and analysis of the knowledge available in document form is a key element of corporate knowledge management. In engineering-intensive organizations, it involves...
Andreas Becks, Stefan Sklorz, Matthias Jarke