Sciweavers

1830 search results - page 284 / 366
» Implementing a Tamper-Evident Database System
Sort
View
94
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 1 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
191
Voted
VLDB
2005
ACM
146views Database» more  VLDB 2005»
16 years 28 days ago
Adaptive website recommendations with AWESOME
Recommendations are crucial for the success of large websites. While there are many ways to determine recommendations, the relative quality of these recommenders depends on many fa...
Andreas Thor, Nick Golovin, Erhard Rahm
185
Voted
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
16 years 25 days ago
Query biased snippet generation in XML search
Snippets are used by almost every text search engine to complement ranking scheme in order to effectively handle user searches, which are inherently ambiguous and whose relevance ...
Yu Huang, Ziyang Liu, Yi Chen
SIGMOD
2007
ACM
158views Database» more  SIGMOD 2007»
16 years 25 days ago
Log-based recovery for middleware servers
We have developed new methods for log-based recovery for middleware servers which involve thread pooling, private inmemory states for clients, shared in-memory state and message i...
Rui Wang 0002, Betty Salzberg, David B. Lomet
182
Voted
SIGMOD
2006
ACM
110views Database» more  SIGMOD 2006»
16 years 25 days ago
Supporting ad-hoc ranking aggregates
This paper presents a principled framework for efficient processing of ad-hoc top-k (ranking) aggregate queries, which provide the k groups with the highest aggregates as results....
Chengkai Li, Kevin Chen-Chuan Chang, Ihab F. Ilyas