Sciweavers

3891 search results - page 414 / 779
» Query Models
Sort
View
TKDE
2008
122views more  TKDE 2008»
15 years 4 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
CIKM
2009
Springer
15 years 11 months ago
Exploring relevance for clicks
Mining feedback information from user click-through data is an important issue for modern Web retrieval systems in terms of architecture analysis, performance evaluation and algor...
Rongwei Cen, Yiqun Liu, Min Zhang, Bo Zhou, Liyun ...
FOCS
1998
IEEE
15 years 8 months ago
Quantum Lower Bounds by Polynomials
We examine the number T of queries that a quantum network requires to compute several Boolean functions on f0;1gN in the black-box model. We show that, in the blackbox model, the ...
Robert Beals, Harry Buhrman, Richard Cleve, Michel...
SIGMOD
1990
ACM
122views Database» more  SIGMOD 1990»
15 years 8 months ago
Access Support in Object Bases
In this work access support relataons are introduced as a means for optlmizmg query processing m object-oriented database systems The general idea 1s to mamtam redundant separate ...
Alfons Kemper, Guido Moerkotte
3DOR
2008
15 years 7 months ago
Part Analogies in Sets of Objects
Shape retrieval can benefit from analogies among similar shapes and parts of different objects. By partitioning an object to meaningful parts and finding analogous parts in other ...
Shy Shalom, Lior Shapira, Ariel Shamir, Daniel Coh...