Sciweavers

98 search results - page 14 / 20
» edbt 2009
Sort
View
EDBT
2009
ACM
170views Database» more  EDBT 2009»
15 years 2 months ago
Efficient constraint evaluation in categorical sequential pattern mining for trajectory databases
The classic Generalized Sequential Patterns (GSP) algorithm returns all frequent sequences present in a database. However, usually a few ones are interesting from a user's po...
Leticia I. Gómez, Alejandro A. Vaisman
EDBT
2009
ACM
156views Database» more  EDBT 2009»
15 years 2 months ago
Evaluating very large datalog queries on social networks
We consider a near future scenario in which users of a Web 2.0 application, such as a social network, contribute to the application not only data, but also rules which automatical...
Royi Ronen, Oded Shmueli
90
Voted
EDBT
2009
ACM
126views Database» more  EDBT 2009»
15 years 1 months ago
A tool for mapping discovery over revealing schemas
In a world of wide-scale information sharing, the decentralized coordination has to consolidate a variety of heterogeneity. Shared data are described in different formats, i.e. da...
Verena Kantere, Dimos Bousounis, Timos K. Sellis
EDBT
2009
ACM
222views Database» more  EDBT 2009»
15 years 4 months ago
Data clouds: summarizing keyword search results over structured data
Keyword searches are attractive because they facilitate users searching structured databases. On the other hand, tag clouds are popular for navigation and visualization purposes o...
Georgia Koutrika, Zahra Mohammadi Zadeh, Hector Ga...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 4 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...