Sciweavers

4790 search results - page 406 / 958
» Reverse Query Processing
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 5 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
ECIR
1998
Springer
15 years 5 months ago
User-Chosen Phrases in Interactive Query Formulation for Information Retrieval
The impact of using phrases as content representation for documents and for queries has generally been accepted as a desirable feature in information retrieval systems because phr...
Alan F. Smeaton, Fergus Kelledy
GIS
2010
ACM
15 years 2 months ago
Exploiting local node cache in top-k queries within wireless sensor networks
Top-k queries are a popular type of query in Wireless Sensor Networks. Typical solutions rely on coordinated root-tonodes and nodes-to-root messages and on maintaining filters at...
Johannes Niedermayer, Mario A. Nascimento, Matthia...
GI
2010
Springer
15 years 1 months ago
Query Languages for Semantic Web Services
: Even though service discovery is one of the vital steps in Web service invocation, service requests are usually expressed by rather simple means. While syntax-based service descr...
Stefan Schulte 0002, Melanie Siebenhaar, Julian Ec...
CORR
2011
Springer
148views Education» more  CORR 2011»
14 years 11 months ago
On Social-Temporal Group Query with Acquaintance Constraint
Three essential criteria are important for activity planning, including: (1) finding a group of attendees familiar with the initiator, (2) ensuring each attendee in the group to ...
De-Nian Yang, Yi-Ling Chen, Wang-Chien Lee, Ming-S...