Sciweavers

3319 search results - page 375 / 664
» Type Theoretical Databases
Sort
View
190
Voted
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
16 years 4 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
16 years 4 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
SIGMOD
2005
ACM
150views Database» more  SIGMOD 2005»
16 years 4 months ago
BRAID: Stream Mining through Group Lag Correlations
The goal is to monitor multiple numerical streams, and determine which pairs are correlated with lags, as well as the value of each such lag. Lag correlations (and anticorrelation...
Yasushi Sakurai, Spiros Papadimitriou, Christos Fa...
SIGMOD
2004
ACM
157views Database» more  SIGMOD 2004»
16 years 4 months ago
Adaptive Ordering of Pipelined Stream Filters
We consider the problem of pipelined filters, where a continuous stream of tuples is processed by a set of commutative filters. Pipelined filters are common in stream applications...
Shivnath Babu, Rajeev Motwani, Kamesh Munagala, It...
PODS
2002
ACM
117views Database» more  PODS 2002»
16 years 3 months ago
Monadic Datalog and the Expressive Power of Languages for Web Information Extraction
Research on information extraction from Web pages (wrapping) has seen much activity in recent times (particularly systems implementations), but little work has been done on formal...
Georg Gottlob, Christoph Koch