Sciweavers

735 search results - page 91 / 147
» Evaluating Probabilistic Queries over Imprecise Data
Sort
View
ISI
2006
Springer
14 years 11 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ICDE
2007
IEEE
119views Database» more  ICDE 2007»
15 years 6 months ago
Practical Preference Relations for Large Data Sets
User-defined preferences allow personalized ranking of query results. A user provides a declarative specification of his/her preferences, and the system is expected to use that ...
Kenneth A. Ross, Peter J. Stuckey, Amélie M...
ICNS
2006
IEEE
15 years 5 months ago
Mobile Ad Hoc Networking Approach to Detecting and Querying Events Related to Farm Animals
This paper proposes a mobile ad hoc networking approach to detecting and querying events related to farm animals such as oestrus, animal diseases and decreased efficiency of pastu...
Milena Radenkovic, Bartosz Wietrzyk
WEBI
2007
Springer
15 years 6 months ago
Concordance-Based Entity-Oriented Search
— We consider the problem of finding the relevant named entities in response to a search query over a given text corpus. Entity search can readily be used to augment conventiona...
Mikhail Bautin, Steven Skiena
VLDB
2007
ACM
129views Database» more  VLDB 2007»
15 years 6 months ago
Anytime Measures for Top-k Algorithms
Top-k queries on large multi-attribute data sets are fundamental operations in information retrieval and ranking applications. In this paper, we initiate research on the anytime b...
Benjamin Arai, Gautam Das, Dimitrios Gunopulos, Ni...