Sciweavers

1890 search results - page 257 / 378
» Querying Big Data by Accessing Small Data
Sort
View
IEEESP
2010
101views more  IEEESP 2010»
14 years 9 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato
CCS
2007
ACM
15 years 3 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
CIKM
2008
Springer
15 years 1 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho
PODS
2012
ACM
253views Database» more  PODS 2012»
13 years 1 months ago
Local transformations and conjunctive-query equivalence
Over the past several decades, the study of conjunctive queries has occupied a central place in the theory and practice of database systems. In recent years, conjunctive queries h...
Ronald Fagin, Phokion G. Kolaitis
IEEESCC
2005
IEEE
15 years 4 months ago
Satisfying Database Service Level Agreements while Minimizing Cost through Storage QoS
The emerging paradigms of service oriented architectures and utility-based computing have the potential to greatly reduce the cost of data management. Data management service prov...
Frederick Reiss, Tapas Kanungo