Sciweavers

1457 search results - page 171 / 292
» Privacy Challenges for Database Systems
Sort
View
VLDB
1998
ACM
110views Database» more  VLDB 1998»
15 years 8 months ago
Massive Stochastic Testing of SQL
Deterministic testing of SQL database systems is human intensive and cannot adequately cover the SQL input domain. A system (RAGS), was built to stochastically generate valid SQL ...
Donald R. Slutz
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
16 years 5 months ago
Ontology-Based Constraint Recognition for Free-Form Service Requests
Automatic recognition and formalization of constraints from free-form service requests is a challenging problem. Its resolution would go a long way toward allowing users to make r...
Muhammed Al-Muhammed, David W. Embley
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 5 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
EDBT
2008
ACM
146views Database» more  EDBT 2008»
16 years 4 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
123
Voted
DEXAW
2006
IEEE
129views Database» more  DEXAW 2006»
15 years 10 months ago
Interaction Styles for Service Discovery in Mobile Business Applications
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...