Sciweavers

365 search results - page 26 / 73
» Exploiting Model-based Techniques for User Interfaces to Dat...
Sort
View
TKDE
2008
122views more  TKDE 2008»
15 years 3 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
EDBT
2010
ACM
132views Database» more  EDBT 2010»
15 years 6 months ago
Turbo-charging hidden database samplers with overflowing queries and skew reduction
Recently, there has been growing interest in random sampling from online hidden databases. These databases reside behind form-like web interfaces which allow users to execute sear...
Arjun Dasgupta, Nan Zhang 0004, Gautam Das
EDBT
1992
ACM
79views Database» more  EDBT 1992»
15 years 7 months ago
Theoretical Aspects of Schema Merging
A general technique for merging database schemas is developed that has a number of advantages over existing techniques, the most important of which is that schemas are placed in a...
Peter Buneman, Susan B. Davidson, Anthony Kosky
KDD
2000
ACM
147views Data Mining» more  KDD 2000»
15 years 6 months ago
A self organizing map (SOM) extended model for information discovery in a digital library context
This paper presents the MicroNOMAD Discovering Tool. Its main characteristic is both to provide an user with emergent analyses of a multimedia database content and with querying a...
Jean-Charles Lamirel, Jacques Ducloy, Hager Kammou...
AVI
2010
15 years 4 months ago
Advanced visual analytics interfaces
Advanced visual interfaces, like the ones found in informaualization, intend to offer a view on abstract data spaces to enable users to make sense of them. By mapping data to visu...
Daniel A. Keim, Peter Bak, Enrico Bertini, Daniela...