Sciweavers

14824 search results - page 2481 / 2965
» Security - Introduction
Sort
View
211
Voted
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
16 years 4 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
16 years 4 months ago
Exchanging Intensional XML Data
XML is becoming the universal format for data exchange between applications. Recently, the emergence of Web services as standard means of publishing and accessing data on the Web ...
Tova Milo, Serge Abiteboul, Bernd Amann, Omar Benj...
PODS
2008
ACM
204views Database» more  PODS 2008»
16 years 4 months ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen
EDBT
2006
ACM
181views Database» more  EDBT 2006»
16 years 4 months ago
TeNDaX, a Collaborative Database-Based Real-Time Editor System
TeNDaX is a collaborative database-based real-time editor system. TeNDaX is a new approach for word-processing in which documents (i.e. content and structure, tables, images etc.) ...
Klaus R. Dittrich, Michael H. Böhlen, Stefani...
153
Voted
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 4 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
« Prev « First page 2481 / 2965 Last » Next »