Sciweavers

613 search results - page 98 / 123
» Query Evaluation on a Database Given by a Random Graph
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 6 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
ICDE
2010
IEEE
189views Database» more  ICDE 2010»
15 years 19 hour ago
Caching all plans with just one optimizer call
Abstract— Modern database management systems (DBMS) answer a multitude of complex queries on increasingly larger datasets. Given the complexities of the queries and the numerous ...
Debabrata Dash, Ioannis Alagiannis, Cristina Maier...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 4 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
BMCBI
2008
116views more  BMCBI 2008»
14 years 12 months ago
MScanner: a classifier for retrieving Medline citations
Background: Keyword searching through PubMed and other systems is the standard means of retrieving information from Medline. However, ad-hoc retrieval systems do not meet all of t...
Graham L. Poulter, Daniel L. Rubin, Russ B. Altman...
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
16 years 13 days ago
Universally utility-maximizing privacy mechanisms
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan