Sciweavers

4113 search results - page 484 / 823
» Watermarking Relational Databases
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 11 months ago
Optimization of Query Plans in the presence of Access Limitations
We consider the problem of querying data sources that have limited capabilities and can thus only be accessed by complying with certain binding patterns for their attributes. This ...
Andrea Calì, Diego Calvanese, Davide Martin...
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 11 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu
VLDB
2007
ACM
229views Database» more  VLDB 2007»
15 years 11 months ago
Sum-Max Monotonic Ranked Joins for Evaluating Top-K Twig Queries on Weighted Data Graphs
In many applications, the underlying data (the web, an XML document, or a relational database) can be seen as a graph. These graphs may be enriched with weights, associated with t...
Yan Qi 0002, K. Selçuk Candan, Maria Luisa ...
157
Voted
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
15 years 11 months ago
A Survey on Disk Oriented Querying and Reasoning on the Semantic Web
This paper presents a description of seven systems, which use database technology to both represent knowledge persistently and make scalable queries on it, in the Semantic Web con...
María del Mar Roldán García, ...