Sciweavers

3319 search results - page 251 / 664
» Type Theoretical Databases
Sort
View
ICDE
2010
IEEE
494views Database» more  ICDE 2010»
16 years 2 months ago
Hashing Tree-Structured Data: Methods and Applications
In this article we propose a new hashing framework for tree-structured data. Our method maps an unordered tree into a multiset of simple wedge-shaped structures refered to as pivot...
Shirish Tatikonda, Srinivasan Parthasarathy
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
16 years 2 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
ICASSP
2008
IEEE
15 years 9 months ago
On the optimality of ideal binary time-frequency masks
Recently the concept of ideal binary time-frequency masks has received attention and their optimality in terms of signalto-noise ratio has been presumed. However the optimality is...
Yipeng Li, DeLiang Wang
SISAP
2008
IEEE
153views Data Mining» more  SISAP 2008»
15 years 9 months ago
Counting Distance Permutations
Distance permutation indexes support fast proximity searching in high-dimensional metric spaces. Given some fixed reference sites, for each point in a database the index stores a...
Matthew Skala
ADBIS
2007
Springer
125views Database» more  ADBIS 2007»
15 years 9 months ago
Towards Self-Optimization of Message Transformation Processes
The Message Transformation Model (MTM), for modeling complex message transformation processes in data centric application scenarios, provides strong capabilities for describing the...
Matthias Böhm, Dirk Habich, Uwe Wloka, Jü...