Sciweavers

1192 search results - page 131 / 239
» Symbolic Query Exploration
Sort
View
207
Voted
CSFW
2011
IEEE
14 years 3 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
ICDE
2008
IEEE
117views Database» more  ICDE 2008»
16 years 4 months ago
MOOLAP: Towards Multi-Objective OLAP
Aggregation is among the core functionalities of OLAP systems. Frequently, such queries are issued in decision support systems to identify interesting groups of data. When more tha...
Shyam Antony, Ping Wu, Divyakant Agrawal, Amr El A...
118
Voted
WSDM
2009
ACM
115views Data Mining» more  WSDM 2009»
15 years 10 months ago
Discovering and using groups to improve personalized search
Personalized Web search takes advantage of information about an individual to identify the most relevant results for that person. A challenge for personalization lies in collectin...
Jaime Teevan, Meredith Ringel Morris, Steve Bush
SUTC
2008
IEEE
15 years 9 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
16 years 4 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes