Sciweavers

75 search results - page 8 / 15
» Repair checking in inconsistent databases: algorithms and co...
Sort
View
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 5 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
ICDT
2007
ACM
141views Database» more  ICDT 2007»
15 years 5 months ago
Exact XML Type Checking in Polynomial Time
Stay macro tree transducers (smtts) are an expressive formalism for reasoning about XSLT-like document transformations. Here, we consider the exact type checking problem for smtts....
Sebastian Maneth, Thomas Perst, Helmut Seidl
SIGMOD
2009
ACM
155views Database» more  SIGMOD 2009»
15 years 11 months ago
Efficient top-k algorithms for fuzzy search in string collections
An approximate search query on a collection of strings finds those strings in the collection that are similar to a given query string, where similarity is defined using a given si...
Rares Vernica, Chen Li
SIGMOD
2006
ACM
111views Database» more  SIGMOD 2006»
15 years 11 months ago
Reconciling while tolerating disagreement in collaborative data sharing
In many data sharing settings, such as within the biological and biomedical communities, global data consistency is not always attainable: different sites' data may be dirty,...
Nicholas E. Taylor, Zachary G. Ives
135
Voted
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
15 years 5 months ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...