Sciweavers

373 search results - page 36 / 75
» Querying Priced Information in Databases: The Conjunctive Ca...
Sort
View
IPMU
2010
Springer
14 years 8 months ago
Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies
Controlled Query Evaluation (CQE) is a logical framework for the protection of secrets in databases. In this article, we extend the CQE framework to possibilistic logic: knowledge ...
Lena Wiese
75
Voted
VLDB
1997
ACM
78views Database» more  VLDB 1997»
15 years 1 months ago
Recovering Information from Summary Data
Data is often stored in summarized form, as a histogram of aggregates (COUNTs, SUMs, or AVeraGes) over speci ed ranges. We study how to estimate the original detail data from the ...
Christos Faloutsos, H. V. Jagadish, Nikolaos Sidir...
DAWAK
2000
Springer
15 years 2 months ago
Applying Vertical Fragmentation Techniques in Logical Design of Multidimensional Databases
In the context of multidimensional databases implemented on relational DBMSs through star schemes, the most effective technique to enhance performances consists of materializing re...
Matteo Golfarelli, Dario Maio, Stefano Rizzi
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
15 years 11 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
GIS
2005
ACM
15 years 10 months ago
Adaptive nearest neighbor queries in travel time networks
Nearest neighbor (NN) searches represent an important class of queries in geographic information systems (GIS). Most nearest neighbor algorithms rely on static distance informatio...
Wei-Shinn Ku, Roger Zimmermann, Haojun Wang, Chi-N...