Sciweavers

75 search results - page 8 / 15
» Repair checking in inconsistent databases: algorithms and co...
Sort
View
76
Voted
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 2 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
ICDT
2007
ACM
141views Database» more  ICDT 2007»
15 years 3 months ago
Exact XML Type Checking in Polynomial Time
Stay macro tree transducers (smtts) are an expressive formalism for reasoning about XSLT-like document transformations. Here, we consider the exact type checking problem for smtts....
Sebastian Maneth, Thomas Perst, Helmut Seidl
SIGMOD
2009
ACM
155views Database» more  SIGMOD 2009»
15 years 9 months ago
Efficient top-k algorithms for fuzzy search in string collections
An approximate search query on a collection of strings finds those strings in the collection that are similar to a given query string, where similarity is defined using a given si...
Rares Vernica, Chen Li
176
Voted
SIGMOD
2006
ACM
111views Database» more  SIGMOD 2006»
15 years 9 months ago
Reconciling while tolerating disagreement in collaborative data sharing
In many data sharing settings, such as within the biological and biomedical communities, global data consistency is not always attainable: different sites' data may be dirty,...
Nicholas E. Taylor, Zachary G. Ives
ICDM2
2004
Springer
196views Data Mining» more  ICDM2 2004»
15 years 2 months ago
An Early Warning System for Vehicle Related Quality Data
Vehicle production audit tests, warranty claims and car control unit data are stored in a central data warehouse for data mining analysis. Neural network based part failure rate es...
Matthias Grabert, Markus Prechtel, Tomas Hrycej, W...