Sciweavers

210 search results - page 24 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
CCS
2011
ACM
13 years 11 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ER
2003
Springer
173views Database» more  ER 2003»
15 years 5 months ago
Automatic Generation of XQuery View Definitions from ORA-SS Views
Many Internet-based applications have adopted XML as the standard data exchange format. These XML data are typically stored in its native form, thus creating the need to present XM...
Ya Bing Chen, Tok Wang Ling, Mong-Li Lee
WIDM
2003
ACM
15 years 5 months ago
Schema-guided wrapper maintenance for web-data extraction
Extracting data from Web pages using wrappers is a fundamental problem arising in a large variety of applications of vast practical interests. There are two main issues relevant t...
Xiaofeng Meng, Dongdong Hu, Chen Li
BMCBI
2010
183views more  BMCBI 2010»
14 years 12 months ago
SING: Subgraph search In Non-homogeneous Graphs
Background: Finding the subgraphs of a graph database that are isomorphic to a given query graph has practical applications in several fields, from cheminformatics to image unders...
Raffaele Di Natale, Alfredo Ferro, Rosalba Giugno,...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
16 years 3 days ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson