Sciweavers

1445 search results - page 127 / 289
» XPath query containment
Sort
View
GIS
2009
ACM
15 years 11 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ICDE
2010
IEEE
491views Database» more  ICDE 2010»
15 years 9 months ago
TrajStore: An Adaptive Storage System for Very Large Trajectory Data Sets
The rise of GPS and broadband-speed wireless devices has led to tremendous excitement about a range of applications broadly characterized as "location based services". Cu...
Philippe Cudré-Mauroux, Eugene Wu, Samuel M...
SIGIR
2009
ACM
15 years 4 months ago
Automatic URL completion and prediction using fuzzy type-ahead search
Type-ahead search is a new information-access paradigm, in which systems can find answers to keyword queries “onthe-fly” as a user types in a query. It improves traditional ...
Jiannan Wang, Guoliang Li, Jianhua Feng
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
15 years 3 months ago
A Nested Relational Approach to Processing SQL Subqueries
One of the most powerful features of SQL is the use of nested queries. Most research work on the optimization of nested queries focuses on aggregate subqueries. However, the solut...
Bin Cao, Antonio Badia
ESA
2004
Springer
160views Algorithms» more  ESA 2004»
15 years 3 months ago
Optimal External Memory Planar Point Enclosure
Abstract. In this paper we study the external memory planar point enclosure problem: Given N axis-parallel rectangles in the plane, construct a data structure on disk (an index) su...
Lars Arge, Vasilis Samoladas, Ke Yi