Sciweavers

ICDE
2003
IEEE
130views Database» more  ICDE 2003»
16 years 6 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
16 years 6 months ago
PeerDB: A P2P-based System for Distributed Data Sharing
In this paper, we present the design and evaluation of PeerDB, a peer-to-peer (P2P) distributed data sharing system. PeerDB distinguishes itself from existing P2P systems in sever...
Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying ...
ICDE
2003
IEEE
209views Database» more  ICDE 2003»
16 years 6 months ago
An Evaluation of Regular Path Expressions with Qualifiers against XML Streams
This paper presents SPEX, a streamed and progressive evaluation of regular path expressions with XPath-like qualifiers against XML streams. SPEX proceeds as follows. An expression...
Dan Olteanu, François Bry, Tobias Kiesling
ICDE
2003
IEEE
97views Database» more  ICDE 2003»
16 years 6 months ago
Spectral LPM: An Optimal Locality-Preserving Mapping using the Spectral (not Fractal) Order
For the past two decades, fractals (e.g., the Hilbert and Peano space-filling curves) have been considered the natural method for providing a locality-preserving mapping. The idea...
Mohamed F. Mokbel, Walid G. Aref, Ananth Grama
225
Voted
ICDE
2003
IEEE
127views Database» more  ICDE 2003»
16 years 6 months ago
Application Servers and Associated Technologies
C. Mohan
209
Voted
ICDE
2003
IEEE
126views Database» more  ICDE 2003»
16 years 6 months ago
SG-WRAM Schema Guided Wrapper Maintenance
Xiaofeng Meng, Haiyan Wang, Dongdong Hu, Mingzhe G...
202
Voted
ICDE
2003
IEEE
127views Database» more  ICDE 2003»
16 years 6 months ago
Data Integration by Bi-Directional Schema Transformation Rules
Peter McBrien, Alexandra Poulovassilis
ICDE
2003
IEEE
146views Database» more  ICDE 2003»
16 years 6 months ago
Similarity Search in Sets and Categorical Data Using the Signature Tree
Data mining applications analyze large collections of set data and high dimensional categorical data. Search on these data types is not restricted to the classic problems of minin...
Nikos Mamoulis, David W. Cheung, Wang Lian
ICDE
2003
IEEE
125views Database» more  ICDE 2003»
16 years 6 months ago
A Comparison of Three Methods for Join View Maintenance in Parallel RDBMS
Gang Luo, Jeffrey F. Naughton, Curt J. Ellmann, Mi...
ICDE
2003
IEEE
211views Database» more  ICDE 2003»
16 years 6 months ago
Capturing Sensor-Generated Time Series with Quality Guarantees
We are interested in capturing time series generated by small wireless electronic sensors. Battery-operated sensors must avoid heavy use of their wireless radio which is a key cau...
Iosif Lazaridis, Sharad Mehrotra